option
Questions
ayuda
daypo
search.php

SY0_701_100 Part 2

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
SY0_701_100 Part 2

Description:
prova secu

Creation Date: 2026/01/19

Category: Others

Number of questions: 26

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Which of the following control types is AUP an example of?. physical. Managerial. Technical. Operational.

Which of the following is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?. Open-source intelligence. Port scanning. Pivoting. Exploit validation.

Which of the following would be the best way to test resiliency in the event of a primary power failure?. Parallel processing. Tabletop exercise. Simulation testing. Production failover.

Which of the following would be the most appropriate way to protect data in transit?. SHA-256. SSL3.0. TLS 1.3. AES-256.

Which of the following is used to conceal credit card information in a database log file?. Tokenization. Masking. Hashing. Obfuscation.

An organization is adopting Cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in, so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first Step the security team should take?. Enable SAML. Create OAuth tokens. Use password vaulting. Select an IdP.

A company/s online shopping website became unusable shortly after midnight on January 30, 2023. When a security analyst reviewed the database server, the analyst noticed the following code used for backing up data. image Which of the following should the analyst do next?. Check for recently terminated DBAs. Review WAF logs for evidence of command injection. Scan the database server for malware. Search the web server for ransomware notes.

A security analyst is evaluating a SaaS application that the human resources department would like to implement. The analyst requests a SOC 2 report from the SaaS vendor. Which of the following processes is the analyst most likely conducting?. Internal audit. Penetration testing. Attestation. Due diligence.

Which of the following topics would most likely be included within an organizations SDLC?. Service-level agreements. Information security policy. Penetration testing methodology. Branch protection requirements.

A database administrator is the company's SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?. Hashing. Obfuscation. Tokenization. Masking.

Which of the following threat actors is the most likely to seek financial gain through the use of ransomware attacks?. Organized crime. Insider threat. Nation-state. HacktMsts.

Which of the following activities are associated with vulnerability management? (Choose two.). Reporting. Prioritization. Exploiting. CorrelationR. Containment. Tabletop exercise.

The security team has been asked to only enable host A (10.2.2.7) and host B (10.3.9.9) to the new isolated network segment (10.9.8.14) that provides access to legacy devices. Access from all Other hosts should be blocked- Which of the following entries would need to be added on the firewall?. Permit 10.2.2.0/24 to 10.9.8.14/27 Permit 10.3.9.0/24 to 10.9.8.14/27 Deny 0.0.0.0/0 to 10.9.8.14/27. Deny 0.0.0.0/0 to 10.9.8.14/27 Permit 10.2.2.0/24 to 10.9.8.14/27 Permit 10.3.9.0/24 to 10.9.8.14/27. Permit 10.2.2.7/32 to 10.9.8.14/27 Permit 10.3.9.9/32 to 10.9.8.14/27 Deny O.O.O.O/O to 10.9.8.14/27. Permit 10.2.2.7/32 to 10.9.8.14/27 Permit 10.3.9.0/24 to 10.9.8.14/27 Deny 10.9.8.14/27 to O.O.O.O/O.

A systems administrator is concemed about vulnerabilities within Cloud computing instances. Which of the following is most important for the administrator to consider when architecting a cloud computing environment?. SQL injection. TOC/TOU. VM escape. Tokenization. Password spraying.

Which of the following is a benefit of vendor diversity?. Patch availability. Zero-day resiliency. Secure configuration guide applicability. Load balancing.

Which of the following would a systems administrator follow when upgrading the firmware of an organization's router?. Software development life cycle. Risk tolerance. Certificate signing request. Maintenance window.

A systems administrator needs to ensure the secure communication of sensitive data within the organization's vivate cloud- Which of the following is the best choice for the administrator to implement?. IPSE. SHA-1. RSA. TGT.

An administrator wants to perform a risk assessment without using proprietary company information. Which of the following methods should the administrator use to gather information?. Network scanning. Penetration testing. Open-source intelligence. Configuration auditing.

Which of the following should an internal auditor check for first when conducting an audit of the organization's risk management program?. Policies and procedures. Asset management. Vulnerability assessment. Business impact analysis.

Which of the following tasks is typically included in the BIA process?. Estimating the recovery time of systems. Identifying the communication strategy. Evaluating the risk management plan. Establishing the backup and recovery procedures. Developing the incident response plan.

Which of the following is a risk of conducting a vulnerability assessment?. A disruption of business operations. Unauthorized access to the system. Reports of false positives. Finding security gaps in the system.

Which of the following would enable a data center to remain operational through a multiday power outage?. Generator. Uninterruptible power supply. Replication.

Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?. Creating a false text file in /docs/salaries. Setting weak passwords in /etc/shadov. Scheduling vulnerable jobs in /etc/crontab. Adding a fake account to /etc/passwd.

Which of the following cryptographic solutions protects data at rest?. Digital signatures. Full disk Encryption. Private key. Steganography.

An employee used a company's billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?. Application logs. Vulnerability scanner logs. IDS/IPS logs. Firewall logs.

An organization Plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible. Which of the following models offers the highest level of security?. Cloud-based. Peer-to-peer. On-premises. Hybrid.

Report abuse