CompTIA SY0-701 Practice Test - Questions Answers, Page 43

List of questions
Question 421

Which of the following describes the category of data that is most impacted when it is lost?
Question 422

A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers Which of the following solutions is the organization most likely to employ to further increase performance and availability?
Question 423

Which of the following explains how to determine the global regulations that data is subject to regardless of the country where the data is stored?
Question 424

An attacker submits a request containing unexpected characters in an attempt to gain unauthorized access to information within the underlying systems. Which of the following best describes this attack?
Question 425

An organization wants to improve the company's security authentication method for remote employees. Given the following requirements:
* Must work across SaaS and internal network applications
* Must be device manufacturer agnostic
* Must have offline capabilities
Which of the following would be the most appropriate authentication method?
Question 426

An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?
Question 427

A systems administrator is concerned about vulnerabilities within cloud computing instances Which of the following is most important for the administrator to consider when architecting a cloud computing environment?
Question 428

A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
Question 429

Which of the following would most likely be used by attackers to perform credential harvesting?
Question 430

An organization is implementing a COPE mobile device management policy. Which of the following should the organization include in the COPE policy? (Select two).
Question