Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
SY0-701
Free trial
Verified
Question 101
Which of the following considerations is the most important for an organization to evaluate as it establishes and maintains a data privacy program?
- A: Reporting structure for the data privacy officer
- B: Request process for data subject access
- C: Role as controller or processor
- D: Physical location of the company
Question 102
A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?
- A: IPS
- B: Firewall
- C: AСL
- D: Windows security
Question 103
An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?
- A: Business continuity
- B: Physical security
- C: Change management
- D: Disaster recovery
Question 104
A business needs a recovery site but does not require immediate failover. The business also wants to reduce the workload required to recover from an outage. Which of the following recovery sites is the best option?
- A: Hot
- B: Cold
- C: Warm
- D: Geographically dispersed
Question 105
A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?
- A: Virtualization and isolation of resources
- B: Network segmentation
- C: Data encryption
- D: Strong authentication policies
Question 106
A manager receives an email that contains a link to receive a refund. After hovering over the link, the manager notices that the domain's URL points to a suspicious link. Which of the following security practices helped the manager to identify the attack?
- A: End user training
- B: Policy review
- C: URL scanning
- D: Plain text email
Question 107
A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?
- A: Validate the code signature.
- B: Execute the code in a sandbox.
- C: Search the executable for ASCII strings.
- D: Generate a hash of the files.
Question 108
A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?
- A: Installing HIDS on the system
- B: Placing the system in an isolated VLAN
- C: Decommissioning the system
- D: Encrypting the system's hard drive
Question 109
The Chief Information Security Officer (CISO) at a large company would like to gain an understanding of how the company's security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?
- A: Penetration test
- B: Internal audit
- C: Attestation
- D: External examination
Question 110
A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?
- A: Espionage
- B: Data exfiltration
- C: Nation-state attack
- D: Shadow IT
Question 111
Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
- A: Key stretching
- B: Data masking
- C: Steganography
- D: Salting
Question 112
A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?
- A: encryption=off
- B: http://
- C: www.*.com
- D: :443
Question 113
The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?
- A: Shadow IT
- B: Insider threat
- C: Data exfiltration
- D: Service disruption
Question 114
Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?
- A: To track the status of patching installations
- B: To find shadow IT cloud deployments
- C: To continuously the monitor hardware inventory
- D: To hunt for active attackers in the network
Question 115
Which of the following is classified as high availability in a cloud environment?
- A: Access broker
- B: Cloud HSM
- C: WAF
- D: Load balancer
Question 116
Which of the following security measures is required when using a cloud-based platform for IoT management?
- A: Encrypted connection
- B: Federated identity
- C: Firewall
- D: Single sign-on
Question 117
Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?
- A: Unidentified removable devices
- B: Default network device credentials
- C: Spear phishing emails
- D: Impersonation of business units through typosquatting
Question 118
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?
- A: Encryption
- B: Hashing
- C: Masking
- D: Tokenization
Question 119
The Chief Information Security Officer (CISO) has determined the company is non-compliant with local data privacy regulations. The CISO needs to justify the budget request for more resources. Which of the following should the CISO present to the board as the direct consequence of non-compliance?
- A: Fines
- B: Reputational damage
- C: Sanctions
- D: Contractual implications
Question 120
Which of the following alert types is the most likely to be ignored over time?
- A: True positive
- B: True negative
- C: False positive
- D: False negative
Question 121
A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
- A: Memory injection
- B: Race condition
- C: Side loading
- D: SQL injection
Question 122
An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?
- A: Asset inventory
- B: Network enumeration
- C: Data certification
- D: Procurement process
That’s the end of your free questions
You’ve reached the preview limit for SY0-701Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!