CompTIA SY0-701 Practice Test - Questions Answers, Page 34
List of questions
Related questions
In which of the following scenarios is tokenization the best privacy technique 10 use?
A security administrator recently reset local passwords and the following values were recorded in the system:
Which of the following in the security administrator most likely protecting against?
A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).
Which of the following data roles is responsible for identifying risks and appropriate access to data?
Which of the following should a security operations center use to improve its incident response procedure?
A company is concerned about the theft of client data from decommissioned laptops. Which of the following is the most cost-effective method to decrease this risk?
Wiping
Recycling
Shredding
Deletion
A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?
Buffer overflow
SQL injection
Cross-site scripting
Zero day
While investigating a possible incident, a security analyst discovers the following log entries:
67.118.34.157 ----- [28/Jul/2022:10:26:59 -0300] 'GET /query.php?q-wireless%20headphones / HTTP/1.0' 200 12737
132.18.222.103 ----[28/Jul/2022:10:27:10 -0300] 'GET /query.php?q=123 INSERT INTO users VALUES('temp', 'pass123')# / HTTP/1.0' 200 935
12.45.101.121 ----- [28/Jul/2022:10:27:22 -0300] 'GET /query.php?q=mp3%20players I HTTP/1.0' 200 14650
Which of the following should the analyst do first?
Implement a WAF
Disable the query .php script
Block brute-force attempts on temporary users
Check the users table for new accounts
Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?
TPM
ECC
FDE
HSM
An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?
Cloud-based
Peer-to-peer
On-premises
Hybrid
Question