Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

SY0-701Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 76

A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?

  • A: Full disk encryption
  • B: Network access control
  • C: File integrity monitoring
  • D: User behavior analytics

Question 77

Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked. Which of the following changes would allow users to access the site?

  • A: Creating a firewall rule to allow HTTPS traffic
  • B: Configuring the IPS to allow shopping
  • C: Tuning the DLP rule that detects credit card data
  • D: Updating the categorization in the content filter

Question 78

A security analyst is reviewing the following logs:

Image 1

Which of the following attacks is most likely occurring?

  • A: Password spraying
  • B: Account forgery
  • C: Pass-the-hash
  • D: Brute-force

Question 79

Which of the following most impacts an administrator's ability to address CVEs discovered on a server?

  • A: Rescanning requirements
  • B: Patch availability
  • C: Organizational impact
  • D: Risk tolerance

Question 80

Which of the following describes effective change management procedures?

  • A: Approving the change after a successful deployment
  • B: Having a backout plan when a patch fails
  • C: Using a spreadsheet for tracking changes
  • D: Using an automatic change control bypass for security updates

Question 81

The CIRT is reviewing an incident that involved a human resources recruiter exfiltrating sensitive company data. The CIRT found that the recruiter was able to use HTTP over port 53 to upload documents to a web server. Which of the following security infrastructure devices could have identified and blocked this activity?

  • A: WAF utilizing SSL decryption
  • B: NGFW utilizing application inspection
  • C: UTM utilizing a threat feed
  • D: SD-WAN utilizing IPSec

Question 82

An enterprise is working with a third party and needs to allow access between the internal networks of both parties for a secure file migration. The solution needs to ensure encryption is applied to all traffic that is traversing the networks. Which of the following solutions should most likely be implemented?

  • A: EAP
  • B: IPSec
  • C: SD-WAN
  • D: TLS

Question 83

An administrator has identified and fingerprinted specific files that will generate an alert if an attempt is made to email these files outside of the organization. Which of the following best describes the tool the administrator is using?

  • A: DLP
  • B: SNMP traps
  • C: SCAP
  • D: IPS

Question 84

A software developer released a new application and is distributing application files via the developer's website. Which of the following should the developer post on the website to allow users to verify the integrity of the downloaded files?

  • A: Hashes
  • B: Certificates
  • C: Algorithms
  • D: Salting

Question 85

An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?

  • A: Tokenization
  • B: Hashing
  • C: Obfuscation
  • D: Segmentation

Question 86

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?

  • A: Virus
  • B: Trojan
  • C: Spyware
  • D: Ransomware

Question 87

A systems administrator is advised that an external web server is not functioning property. The administrator reviews the following firewall logs containing traffic going to the web server:

Image 1

Which of the following attacks is likely occurring?

  • A: DDoS
  • B: Directory traversal
  • C: Brute-force
  • D: HTTPS downgrade

Question 88

An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?

  • A: Recovery point objective
  • B: Mean time between failures
  • C: Recovery time objective
  • D: Mean time to repair

Question 89

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

  • A: Secured zones
  • B: Subject role
  • C: Adaptive identity
  • D: Threat scope reduction

Question 90

A security engineer is installing an IPS to block signature-based attacks in the environment.

Which of the following modes will best accomplish this task?

  • A: Monitor
  • B: Sensor
  • C: Audit
  • D: Active

Question 91

An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?

  • A: XDR
  • B: SPF
  • C: DLP
  • D: DMARC

Question 92

Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?

  • A: IDS
  • B: ACL
  • C: EDR
  • D: NAC

Question 93

Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?

  • A: Availability
  • B: Confidentiality
  • C: Integrity
  • D: Non-repudiation

Question 94

Which of the following describes the category of data that is most impacted when it is lost?

  • A: Confidential
  • B: Public
  • C: Private
  • D: Critical

Question 95

A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?

  • A: Business email
  • B: Social engineering
  • C: Unsecured network
  • D: Default credentials

Question 96

Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?

  • A: SLA
  • B: MOU
  • C: MOA
  • D: BPA

Question 97

A company that is located in an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?

  • A: Cold
  • B: Tertiary
  • C: Warm
  • D: Hot

Question 98

Which of the following security controls is most likely being used when a critical legacy server is segmented into a private network?

  • A: Deterrent
  • B: Corrective
  • C: Compensating
  • D: Preventive

Question 99

Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?

  • A: Compliance reporting
  • B: GDPR
  • C: Due diligence
  • D: Attestation

Question 100

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?

  • A: RDP server
  • B: Jump server
  • C: Proxy server
  • D: Hypervisor
Page 4 of 25 • Questions 76-100 of 609

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!