CompTIA SY0-701 Practice Test - Questions Answers, Page 36

List of questions
Question 351

Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
Question 352

An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?
Question 353

A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?
Question 354

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?
Question 355

Which of the following should an organization focus on the most when making decisions about vulnerability prioritization?
Question 356

A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:
Which of the following best describes the indicator that triggered the alert?
Question 357

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?
Question 358

Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
Question 359

A security professional discovers a folder containing an employee's personal information on the enterprise's shared drive. Which of the following best describes the data type the security professional should use to identify organizational policies and standards concerning the storage of employees' personal information?
Question 360

An organization needs to monitor its users' activities to prevent insider threats. Which of the following solutions would help the organization achieve this goal?
Question