CompTIA SY0-701 Practice Test - Questions Answers, Page 32

List of questions
Question 311

A bank set up a new server that contains customers' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?
Question 312

A legacy device is being decommissioned and is no longer receiving updates or patches. Which of the following describes this scenario?
Question 313

Employees located off-site must have access to company resources in order to complete their assigned tasks These employees utilize a solution that allows remote access without interception concerns. Which of the following best describes this solution?
Question 314

Which of the following alert types is the most likely to be ignored over time?
Question 315

The Chief Information Security Officer (CISO) at a large company would like to gain an understanding of how the company's security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?
Question 316

A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?
Question 317

An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
Question 318

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?
Question 319

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?
Question 320

A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?
Question