ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 28

Add to Whishlist

List of questions

Question 271

Report Export Collapse

Which of the following is die most important security concern when using legacy systems to provide production service?

Become a Premium Member for full access
  Unlock Premium Member

Question 272

Report Export Collapse

Cadets speaking a foreign language are using company phone numbers to make unsolicited phone calls lo a partner organization. A security analyst validates through phone system logs that the calls are occurring and the numbers are not being spoofed. Which of the following is the most likely explanation?

Become a Premium Member for full access
  Unlock Premium Member

Question 273

Report Export Collapse

An IT security team is concerned about the confidentiality of documents left unattended in MFPs. Which of the following should the security team do to mitigate the situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 274

Report Export Collapse

A systems administrator is auditing all company servers to ensure. They meet the minimum security baseline While auditing a Linux server, the systems administrator observes the /etc/shadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 275

Report Export Collapse

During a recent company safety stand-down, the cyber-awareness team gave a presentation on the importance of cyber hygiene. One topic the team covered was best practices for printing centers. Which of the following describes an attack method that relates to printing centers?

Become a Premium Member for full access
  Unlock Premium Member

Question 276

Report Export Collapse

A software developer would like to ensure. The source code cannot be reverse engineered or debugged. Which of the following should the developer consider?

Become a Premium Member for full access
  Unlock Premium Member

Question 277

Report Export Collapse

Which of the following is a common source of unintentional corporate credential leakage in cloud environments?

Become a Premium Member for full access
  Unlock Premium Member

Question 278

Report Export Collapse

A security audit of an organization revealed that most of the IT staff members have domain administrator credentials and do not change the passwords regularly. Which of the following solutions should the security learn propose to resolve the findings in the most complete way?

Become a Premium Member for full access
  Unlock Premium Member

Question 279

Report Export Collapse

A company wants to get alerts when others are researching and doing reconnaissance on the company One approach would be to host a part of the Infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach?

Become a Premium Member for full access
  Unlock Premium Member

Question 280

Report Export Collapse

Which of the following best describes why me SMS DIP authentication method is more risky to implement than the TOTP method?

Become a Premium Member for full access
  Unlock Premium Member
Total 549 questions
Go to page: of 55
Search

Related questions