Pass4itsure > CompTIA > CompTIA Certifications > SY0-701 > SY0-701 Online Practice Questions and Answers

SY0-701 Online Practice Questions and Answers

Questions 4

A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?

A. RBAC

B. ACL

C. SAML

D. GPO

Buy Now
Questions 5

After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?

A. Compensating

B. Detective

C. Preventive

D. Corrective

Buy Now
Questions 6

A security consultant needs secure, remote access to a client environment. Which of the following should the security consultant most likely use to gain access?

A. EAP

B. DHCP

C. IPSec

D. NAT

Buy Now
Questions 7

A company wants to improve end users experiences when they tog in to a trusted partner website The company does not want the users to be issued separate credentials for the partner website Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?

A. Directory service

B. AAA server

C. Federation

D. Multifactor authentication

Buy Now
Questions 8

An accounting intern receives an invoice via email from the Chief Executive Officer (CEO). In the email, the CEO demands the immediate release of funds to the bank account that is listed. Which of the following principles best describes why this attack might be successful?

A. Authority

B. Scarcity

C. Consensus

D. Familiarity

Buy Now
Questions 9

A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?

A. Full disk encryption

B. Network access control

C. File integrity monitoring

D. User behavior analytics

Buy Now
Questions 10

The application development teams have been asked to answer the following questions:

1.

Does this application receive patches from an external source?

2.

Does this application contain open-source code?

3.

Is this application accessible by external users?

4.

Does this application meet the corporate password standard?

Which of the following are these questions part of?

A. Risk control self-assessment

B. Risk management strategy

C. Risk acceptance

D. Risk matrix

Buy Now
Questions 11

During a recent breach, employee credentials were compromised when a service desk employee issued an MFA bypass code to an attacker who called and posed as an employee. Which of the following should be used to prevent this type of incident in the future?

A. Hardware token MFA

B. Biometrics

C. Identity proofing

D. Least privilege

Buy Now
Questions 12

In which of the following scenarios is tokenization the best privacy technique 10 use?

A. Providing pseudo-anonymization tor social media user accounts

B. Serving as a second factor for authentication requests

C. Enabling established customers to safely store credit card Information

D. Masking personal information inside databases by segmenting data

Buy Now
Questions 13

Which of the following best describes configuring devices to log to an off-site location for possible future reference?

A. Log aggregation

B. DLP

C. Archiving

D. SCAP

Buy Now
Exam Code: SY0-701
Exam Name: CompTIA Security+
Last Update: Dec 29, 2024
Questions: 625
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99