ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 30

Add to Whishlist

List of questions

Question 291

Report Export Collapse

A company implemented an MDM policy 10 mitigate risks after repealed instances of employees losing company-provided mobile phones. In several cases. The lost phones were used maliciously to perform social engineering attacks against other employees. Which of the following MDM features should be configured to best address this issue? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 292

Report Export Collapse

A security analyst needs to propose a remediation plan 'or each item in a risk register. The item with the highest priority requires employees to have separate logins for SaaS solutions and different password complexity requirements for each solution. Which of the following implementation plans will most likely resolve this security issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 293

Report Export Collapse

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

CompTIA SY0-701 image Question 293 98986 10022024175414000000

Which of the following is the most likely way a rogue device was allowed to connect?

Become a Premium Member for full access
  Unlock Premium Member

Question 294

Report Export Collapse

Which of the following is the first step to take when creating an anomaly detection process?

Become a Premium Member for full access
  Unlock Premium Member

Question 295

Report Export Collapse

Which of the following is the final step of the modem response process?

Become a Premium Member for full access
  Unlock Premium Member

Question 296

Report Export Collapse

While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

An organization recently started hosting a new service that customers access through a web portal. A security engineer needs to add to the existing security devices a new solution to protect this new service. Which of the following is the engineer most likely to deploy?

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

Which of the following topics would most likely be included within an organization's SDLC?

Become a Premium Member for full access
  Unlock Premium Member
Total 549 questions
Go to page: of 55
Search

Related questions