ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 36

Add to Whishlist

List of questions

Question 351

Report Export Collapse

Which of the following aspects of the data management life cycle is most directly impacted by local and international regulations?

Become a Premium Member for full access
  Unlock Premium Member

Question 352

Report Export Collapse

An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?

Become a Premium Member for full access
  Unlock Premium Member

Question 353

Report Export Collapse

A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?

Become a Premium Member for full access
  Unlock Premium Member

Question 354

Report Export Collapse

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

Become a Premium Member for full access
  Unlock Premium Member

Question 355

Report Export Collapse

Which of the following should an organization focus on the most when making decisions about vulnerability prioritization?

Become a Premium Member for full access
  Unlock Premium Member

Question 356

Report Export Collapse

A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:

CompTIA SY0-701 image Question 356 130577 11282024000853000000

Which of the following best describes the indicator that triggered the alert?

Become a Premium Member for full access
  Unlock Premium Member

Question 357

Report Export Collapse

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?

Become a Premium Member for full access
  Unlock Premium Member

Question 358

Report Export Collapse

Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?

Become a Premium Member for full access
  Unlock Premium Member

Question 359

Report Export Collapse

A security professional discovers a folder containing an employee's personal information on the enterprise's shared drive. Which of the following best describes the data type the security professional should use to identify organizational policies and standards concerning the storage of employees' personal information?

Become a Premium Member for full access
  Unlock Premium Member

Question 360

Report Export Collapse

An organization needs to monitor its users' activities to prevent insider threats. Which of the following solutions would help the organization achieve this goal?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions