ExamGecko
Home / CompTIA / SY0-701 / List of questions
Ask Question

CompTIA SY0-701 Practice Test - Questions Answers, Page 56

Add to Whishlist

List of questions

Question 551

Report Export Collapse

A security analyst receives an alert that there was an attempt to download known malware. Which of the following actions would allow the best chance to analyze the malware?

Become a Premium Member for full access
  Unlock Premium Member

Question 552

Report Export Collapse

Which of the following is the best way to improve the confidentiality of remote connections to an enterprise's infrastructure?

Become a Premium Member for full access
  Unlock Premium Member

Question 553

Report Export Collapse

Which of the following are the best for hardening end-user devices? (Select two)

Become a Premium Member for full access
  Unlock Premium Member

Question 554

Report Export Collapse

Which of the following architecture models ensures that critical systems are physically isolated from the network to prevent access from users with remote access privileges?

Become a Premium Member for full access
  Unlock Premium Member

Question 555

Report Export Collapse

A vendor salesperson is a personal friend of a company's Chief Financial Officer (CFO). The company recently made a large purchase from the vendor, which was directly approved by the CFO. Which of the following best describes this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 556

Report Export Collapse

A program manager wants to ensure contract employees can only use the company's computers Monday through Friday from 9 a.m. to 5 p.m. Which of the following would best enforce this access control?

Become a Premium Member for full access
  Unlock Premium Member

Question 557

Report Export Collapse

Which of the following makes Infrastructure as Code (IaC) a preferred security architecture over traditional infrastructure models?

Become a Premium Member for full access
  Unlock Premium Member

Question 558

Report Export Collapse

An attorney prints confidential documents to a copier in an office space near multiple workstations and a reception desk. When the attorney goes to the copier to retrieve the documents, the documents are missing. Which of the following would best prevent this from reoccurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 559

Report Export Collapse

A software developer wishes to implement an application security technique that will provide assurance of the application's integrity. Which of the following techniques will achieve this?

Become a Premium Member for full access
  Unlock Premium Member

Question 560

Report Export Collapse

Which of the following control types involves restricting IP connectivity to a router's web management interface to protect it from being exploited by a vulnerability?

Become a Premium Member for full access
  Unlock Premium Member
Total 564 questions
Go to page: of 57
Search

Related questions