ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 47

Add to Whishlist

List of questions

Question 461

Report Export Collapse

Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?

Become a Premium Member for full access
  Unlock Premium Member

Question 462

Report Export Collapse

A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?

Become a Premium Member for full access
  Unlock Premium Member

Question 463

Report Export Collapse

A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?

Become a Premium Member for full access
  Unlock Premium Member

Question 464

Report Export Collapse

A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?

Become a Premium Member for full access
  Unlock Premium Member

Question 465

Report Export Collapse

Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees' normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?

Become a Premium Member for full access
  Unlock Premium Member

Question 466

Report Export Collapse

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?

Become a Premium Member for full access
  Unlock Premium Member

Question 467

Report Export Collapse

Which of the following actors attacking an organization is the most likely to be motivated by personal beliefs?

Become a Premium Member for full access
  Unlock Premium Member

Question 468

Report Export Collapse

Which of the following organizational documents is most often used to establish and communicate expectations associated with integrity and ethical behavior within an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 469

Report Export Collapse

An administrator wants to automate an account permissions update for a large number of accounts. Which of the following would best accomplish this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 470

Report Export Collapse

A security consultant is working with a client that wants to physically isolate its secure systems. Which of the following best describes this architecture?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions