Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
SY0-701
Free trial
Verified
Question 76
A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?
- A: Full disk encryption
- B: Network access control
- C: File integrity monitoring
- D: User behavior analytics
Question 77
Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked. Which of the following changes would allow users to access the site?
- A: Creating a firewall rule to allow HTTPS traffic
- B: Configuring the IPS to allow shopping
- C: Tuning the DLP rule that detects credit card data
- D: Updating the categorization in the content filter
Question 78
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
- A: Password spraying
- B: Account forgery
- C: Pass-the-hash
- D: Brute-force
Question 79
Which of the following most impacts an administrator's ability to address CVEs discovered on a server?
- A: Rescanning requirements
- B: Patch availability
- C: Organizational impact
- D: Risk tolerance
Question 80
Which of the following describes effective change management procedures?
- A: Approving the change after a successful deployment
- B: Having a backout plan when a patch fails
- C: Using a spreadsheet for tracking changes
- D: Using an automatic change control bypass for security updates
Question 81
The CIRT is reviewing an incident that involved a human resources recruiter exfiltrating sensitive company data. The CIRT found that the recruiter was able to use HTTP over port 53 to upload documents to a web server. Which of the following security infrastructure devices could have identified and blocked this activity?
- A: WAF utilizing SSL decryption
- B: NGFW utilizing application inspection
- C: UTM utilizing a threat feed
- D: SD-WAN utilizing IPSec
Question 82
An enterprise is working with a third party and needs to allow access between the internal networks of both parties for a secure file migration. The solution needs to ensure encryption is applied to all traffic that is traversing the networks. Which of the following solutions should most likely be implemented?
- A: EAP
- B: IPSec
- C: SD-WAN
- D: TLS
Question 83
An administrator has identified and fingerprinted specific files that will generate an alert if an attempt is made to email these files outside of the organization. Which of the following best describes the tool the administrator is using?
- A: DLP
- B: SNMP traps
- C: SCAP
- D: IPS
Question 84
A software developer released a new application and is distributing application files via the developer's website. Which of the following should the developer post on the website to allow users to verify the integrity of the downloaded files?
- A: Hashes
- B: Certificates
- C: Algorithms
- D: Salting
Question 85
An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?
- A: Tokenization
- B: Hashing
- C: Obfuscation
- D: Segmentation
Question 86
An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?
- A: Virus
- B: Trojan
- C: Spyware
- D: Ransomware
Question 87
A systems administrator is advised that an external web server is not functioning property. The administrator reviews the following firewall logs containing traffic going to the web server:
Which of the following attacks is likely occurring?
- A: DDoS
- B: Directory traversal
- C: Brute-force
- D: HTTPS downgrade
Question 88
An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?
- A: Recovery point objective
- B: Mean time between failures
- C: Recovery time objective
- D: Mean time to repair
Question 89
An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?
- A: Secured zones
- B: Subject role
- C: Adaptive identity
- D: Threat scope reduction
Question 90
A security engineer is installing an IPS to block signature-based attacks in the environment.
Which of the following modes will best accomplish this task?
- A: Monitor
- B: Sensor
- C: Audit
- D: Active
Question 91
An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?
- A: XDR
- B: SPF
- C: DLP
- D: DMARC
Question 92
Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?
- A: IDS
- B: ACL
- C: EDR
- D: NAC
Question 93
Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?
- A: Availability
- B: Confidentiality
- C: Integrity
- D: Non-repudiation
Question 94
Which of the following describes the category of data that is most impacted when it is lost?
- A: Confidential
- B: Public
- C: Private
- D: Critical
Question 95
A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?
- A: Business email
- B: Social engineering
- C: Unsecured network
- D: Default credentials
Question 96
Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?
- A: SLA
- B: MOU
- C: MOA
- D: BPA
Question 97
A company that is located in an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?
- A: Cold
- B: Tertiary
- C: Warm
- D: Hot
Question 98
Which of the following security controls is most likely being used when a critical legacy server is segmented into a private network?
- A: Deterrent
- B: Corrective
- C: Compensating
- D: Preventive
Question 99
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?
- A: Compliance reporting
- B: GDPR
- C: Due diligence
- D: Attestation
Question 100
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
- A: RDP server
- B: Jump server
- C: Proxy server
- D: Hypervisor
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!