ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 49

Add to Whishlist

List of questions

Question 481

Report Export Collapse

An organization is looking to optimize its environment and reduce the number of patches necessary for operating systems. Which of the following will best help to achieve this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 482

Report Export Collapse

A university employee logged on to the academic server and attempted to guess the system administrators' log-in credentials. Which of the following security measures should the university have implemented to detect the employee's attempts to gain access to the administrators' accounts?

Become a Premium Member for full access
  Unlock Premium Member

Question 483

Report Export Collapse

A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?

Become a Premium Member for full access
  Unlock Premium Member

Question 484

Report Export Collapse

Which of the following cryptographic solutions protects data at rest?

Become a Premium Member for full access
  Unlock Premium Member

Question 485

Report Export Collapse

For which of the following reasons would a systems administrator leverage a 3DES hash from an installer file that is posted on a vendor's website?

Become a Premium Member for full access
  Unlock Premium Member

Question 486

Report Export Collapse

After creating a contract for IT contractors, the human resources department changed several clauses. The contract has gone through three revisions. Which of the following processes should the human resources department follow to track revisions?

Become a Premium Member for full access
  Unlock Premium Member

Question 487

Report Export Collapse

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Become a Premium Member for full access
  Unlock Premium Member

Question 488

Report Export Collapse

A malicious update was distributed to a common software platform and disabled services at many organizations. Which of the following best describes this type of vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 489

Report Export Collapse

Several customers want an organization to verify its security controls are operating effectively and have requested an independent opinion. Which of the following is the most efficient way to address these requests?

Become a Premium Member for full access
  Unlock Premium Member

Question 490

Report Export Collapse

Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions