ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 39

Add to Whishlist

List of questions

Question 381

Report Export Collapse

Which of the following types of vulnerabilities is primarily caused by improper use and management of cryptographic certificates?

Become a Premium Member for full access
  Unlock Premium Member

Question 382

Report Export Collapse

A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Select two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 383

Report Export Collapse

An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 384

Report Export Collapse

Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach affecting offshore offices. Which of the following is this an example of?

Become a Premium Member for full access
  Unlock Premium Member

Question 385

Report Export Collapse

Which of the following is an example of a data protection strategy that uses tokenization?

Become a Premium Member for full access
  Unlock Premium Member

Question 386

Report Export Collapse

Company A jointly develops a product with Company B, which is located in a different country. Company A finds out that their intellectual property is being shared with unauthorized companies. Which of the following has been breached?

Become a Premium Member for full access
  Unlock Premium Member

Question 387

Report Export Collapse

Which of the following activities should a systems administrator perform to quarantine a potentially infected system?

Become a Premium Member for full access
  Unlock Premium Member

Question 388

Report Export Collapse

A company is changing its mobile device policy. The company has the following requirements:

Company-owned devices

Ability to harden the devices

Reduced security risk

Compatibility with company resources

Which of the following would best meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 389

Report Export Collapse

While a user reviews their email, a host gets infected by malware from an external hard drive plugged into the host. The malware steals all the user's credentials stored in the browser. Which of the following training topics should the user review to prevent this situation from reoccurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 390

Report Export Collapse

Which of the following should a company use to provide proof of external network security testing?

Become a Premium Member for full access
  Unlock Premium Member
Total 517 questions
Go to page: of 52
Search

Related questions