CompTIA SY0-701 Practice Test - Questions Answers, Page 39

List of questions
Question 381

Which of the following types of vulnerabilities is primarily caused by improper use and management of cryptographic certificates?
Question 382

A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Select two.)
Question 383

An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?
Question 384

Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach affecting offshore offices. Which of the following is this an example of?
Question 385

Which of the following is an example of a data protection strategy that uses tokenization?
Question 386

Company A jointly develops a product with Company B, which is located in a different country. Company A finds out that their intellectual property is being shared with unauthorized companies. Which of the following has been breached?
Question 387

Which of the following activities should a systems administrator perform to quarantine a potentially infected system?
Question 388

A company is changing its mobile device policy. The company has the following requirements:
Company-owned devices
Ability to harden the devices
Reduced security risk
Compatibility with company resources
Which of the following would best meet these requirements?
Question 389

While a user reviews their email, a host gets infected by malware from an external hard drive plugged into the host. The malware steals all the user's credentials stored in the browser. Which of the following training topics should the user review to prevent this situation from reoccurring?
Question 390

Which of the following should a company use to provide proof of external network security testing?
Question