ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 38

Add to Whishlist

List of questions

Question 371

Report Export Collapse

Which of the following is the best way to prevent an unauthorized user from plugging a laptop into an employee's phone network port and then using tools to scan for database servers?

Become a Premium Member for full access
  Unlock Premium Member

Question 372

Report Export Collapse

Which of the following describes the procedures a penetration tester must follow while conducting a test?

Become a Premium Member for full access
  Unlock Premium Member

Question 373

Report Export Collapse

Which of the following is the stage in an investigation when forensic images are obtained?

Become a Premium Member for full access
  Unlock Premium Member

Question 374

Report Export Collapse

A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?

Become a Premium Member for full access
  Unlock Premium Member

Question 375

Report Export Collapse

A group of developers has a shared backup account to access the source code repository. Which of the following is the best way to secure the backup account if there is an SSO failure?

Become a Premium Member for full access
  Unlock Premium Member

Question 376

Report Export Collapse

Which of the following threat actors would most likely deface the website of a high-profile music group?

Become a Premium Member for full access
  Unlock Premium Member

Question 377

Report Export Collapse

Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?

Become a Premium Member for full access
  Unlock Premium Member

Question 378

Report Export Collapse

A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?

Become a Premium Member for full access
  Unlock Premium Member

Question 379

Report Export Collapse

A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 380

Report Export Collapse

A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added. Which of the following would be the best solution to meet these objectives?

Become a Premium Member for full access
  Unlock Premium Member
Total 517 questions
Go to page: of 52
Search

Related questions