CompTIA SY0-701 Practice Test - Questions Answers, Page 36
List of questions
Question 351
Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?
Question 352
An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?
Question 353
A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?
Question 354
A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?
Question 355
Which of the following should an organization focus on the most when making decisions about vulnerability prioritization?
Question 356
A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:
Which of the following best describes the indicator that triggered the alert?
Question 357
A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?
Question 358
Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
Question 359
A security professional discovers a folder containing an employee's personal information on the enterprise's shared drive. Which of the following best describes the data type the security professional should use to identify organizational policies and standards concerning the storage of employees' personal information?
Question 360
An organization needs to monitor its users' activities to prevent insider threats. Which of the following solutions would help the organization achieve this goal?
Question