CompTIA SY0-701 Practice Test - Questions Answers, Page 47

List of questions
Question 461

Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?
Question 462

A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?
Question 463

A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?
Question 464

A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?
Question 465

Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees' normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?
Question 466

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?
Question 467

Which of the following actors attacking an organization is the most likely to be motivated by personal beliefs?
Question 468

Which of the following organizational documents is most often used to establish and communicate expectations associated with integrity and ethical behavior within an organization?
Question 469

An administrator wants to automate an account permissions update for a large number of accounts. Which of the following would best accomplish this task?
Question 470

A security consultant is working with a client that wants to physically isolate its secure systems. Which of the following best describes this architecture?
Question