ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 34

Add to Whishlist

List of questions

Question 331

Report Export Collapse

In which of the following scenarios is tokenization the best privacy technique 10 use?

Become a Premium Member for full access
  Unlock Premium Member

Question 332

Report Export Collapse

A security administrator recently reset local passwords and the following values were recorded in the system:

CompTIA SY0-701 image Question 332 99025 10022024175414000000

Which of the following in the security administrator most likely protecting against?

Become a Premium Member for full access
  Unlock Premium Member

Question 333

Report Export Collapse

A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 334

Report Export Collapse

Which of the following data roles is responsible for identifying risks and appropriate access to data?

Become a Premium Member for full access
  Unlock Premium Member

Question 335

Report Export Collapse

Which of the following should a security operations center use to improve its incident response procedure?

Become a Premium Member for full access
  Unlock Premium Member

Question 336

Report Export Collapse

A company is concerned about the theft of client data from decommissioned laptops. Which of the following is the most cost-effective method to decrease this risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 337

Report Export Collapse

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company's reliance on open-source libraries?

Become a Premium Member for full access
  Unlock Premium Member

Question 338

Report Export Collapse

While investigating a possible incident, a security analyst discovers the following log entries:

67.118.34.157 ----- [28/Jul/2022:10:26:59 -0300] 'GET /query.php?q-wireless%20headphones / HTTP/1.0' 200 12737

132.18.222.103 ----[28/Jul/2022:10:27:10 -0300] 'GET /query.php?q=123 INSERT INTO users VALUES('temp', 'pass123')# / HTTP/1.0' 200 935

12.45.101.121 ----- [28/Jul/2022:10:27:22 -0300] 'GET /query.php?q=mp3%20players I HTTP/1.0' 200 14650

Which of the following should the analyst do first?

Become a Premium Member for full access
  Unlock Premium Member

Question 339

Report Export Collapse

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?

Become a Premium Member for full access
  Unlock Premium Member

Question 340

Report Export Collapse

An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?

Become a Premium Member for full access
  Unlock Premium Member
Total 517 questions
Go to page: of 52
Search

Related questions