CompTIA SY0-701 Practice Test - Questions Answers, Page 54

List of questions
Question 531

A company's website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?
Question 532

As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?
Question 533

An employee clicks a malicious link in an email that appears to be from the company's Chief Executive Officer. The employee's computer is infected with ransomware that encrypts the company's files. Which of the following is the most effective way for the company to prevent similar incidents in the future?
Question 534

A Chief Information Security Officer (CISO) has developed information security policies that relate to the software development methodology. Which of the following would the CISO most likely include in the organization's documentation?
Question 535

A security report shows that during a two-week test period. 80% of employees unwittingly disclosed their SSO credentials when accessing an external website. The organization purposely created the website to simulate a cost-free password complexity test. Which of the following would best help reduce the number of visits to similar websites in the future?
Question 536

Which of the following elements of digital forensics should a company use If It needs to ensure the integrity of evidence?
Question 537

A company evaluates several options that would allow employees to have remote access to the network. The security team wants to ensure the solution includes AAA to comply with internal security policies. Which of the following should the security team recommend?
Question 538

Which of the following actions best addresses a vulnerability found on a company's web server?
Question 539

The Chief Information Officer (CIO) asked a vendor to provide documentation detailing the specific objectives within the compliance framework that the vendor's services meet. The vendor provided a report and a signed letter stating that the services meet 17 of the 21 objectives. Which of the following did the vendor provide to the CIO?
Question 540

Which of the following can be used to mitigate attacks from high-risk regions?
Question