ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 26

Add to Whishlist

List of questions

Question 251

Report Export Collapse

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 252

Report Export Collapse

An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 253

Report Export Collapse

A security analyst discovers that a large number of employee credentials had been stolen and were being sold on the dark web. The analyst investigates and discovers that some hourly employee credentials were compromised, but salaried employee credentials were not affected.

Most employees clocked in and out while they were Inside the building using one of the kiosks connected to the network. However, some clocked out and recorded their time after leaving to go home. Only those who clocked in and out while Inside the building had credentials stolen. Each of the kiosks are on different floors, and there are multiple routers, since the business segments environments for certain business functions.

Hourly employees are required to use a website called acmetimekeeping.com to clock in and out. This website is accessible from the internet. Which of the following Is the most likely reason for this compromise?

Become a Premium Member for full access
  Unlock Premium Member

Question 254

Report Export Collapse

A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker accessed a blocked sue from a work computer and repotted the issue. While Investigating the issue, a security administrator found another device providing internet access to certain employees. Which of the following best describes the security risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 255

Report Export Collapse

Which of the following is most likely associated with introducing vulnerabilities on a corporate network by the deployment of unapproved software?

Become a Premium Member for full access
  Unlock Premium Member

Question 256

Report Export Collapse

Two companies are in the process of merging. The companies need to decide how to standardize their information security programs. Which of the following would best align the security programs?

Become a Premium Member for full access
  Unlock Premium Member

Question 257

Report Export Collapse

A network administrator deployed a DNS logging tool that togs suspicious websites that are visited and then sends a daily report based on various weighted metrics. Which of the following best describes the type of control the administrator put in place?

Become a Premium Member for full access
  Unlock Premium Member

Question 258

Report Export Collapse

Which of the following is best used to detect fraud by assigning employees to different roles?

Become a Premium Member for full access
  Unlock Premium Member

Question 259

Report Export Collapse

A systems administrate wants to implement a backup solution. the solution needs to allow recovery of the entire system, including the operating system, in case of a disaster. Which of the following backup types should the administrator consider?

Become a Premium Member for full access
  Unlock Premium Member

Question 260

Report Export Collapse

A spoofed identity was detected for a digital certificate. Which of the following are the type of unidentified key and the certificate mat could be in use on the company domain?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions