SY0_701_100 Part 5
|
|
Title of test:
![]() SY0_701_100 Part 5 Description: prova secu |



| New Comment |
|---|
NO RECORDS |
|
Which of the following security principles most likely requires validation before allowing traffic between systems?. Policy enforcement. Authentication. Zero Trust architecture. Confidentiality. An organization keeps severs with confidential information in the same network as workstations. An attacker compromises a workstation and moves laterally to a server. Which of the following could have prevented the attacker from accessing the server?. Load balancers. Security zones. Virtual private networks. Proxy servers. An organization found gaps in its software development environment and is implementing compensating controls to better protect its systems from external threats. Which of the following would be most effective? (Choose two.). Platform hardening. Expanded logging. Network segmentation. Access control. Data encryption. Application allow list. Which of the following activities is used to determine the reason an incident occurred, prior to closing the incident?. Root cause analysis. Detection. E-discovery. Lessons learned. An accounting employee recently used software that was not approved by the company. Which of the following risks does this most likely represent?. Unskilled attacker. Hacktivist. Shadow IT. Supply Chain. An attacker defaces a company/s website and refuses to relinquish control until the company removes specific harmful chemicals from its products. Which of the following best describes this type of threat actor?. Unskilled attacker. Hacktivist. Organized crime. Espionage. A retail company receives a request to remove a customer data. Which of the following is the retail company considered under GDPR legislation?. Data processor. Data controller. Data subject. Data custodian. Which of the following is the greatest advantage that network segmentation provides?. End-to-end encryption. Decreased resource utilization. Enhanced endpoint protection. Configuration enforcement. Security zones. While a user reviews their email, a host gets infected by malware that came from an external hard drive plugged into the host. The malware steals all the uses credentials stored in the browser. Which of the following training topics should the user review to prevent this situation from reoccurring?. Operational security. Removable media and cables. Password management. Social engineering. A database engineer needs sample customer data for testing purposes. Which of the following can prevent unauthorized viewing or disclosure of PIIQ?. Masking. REAC. Tokenization. Filtering. An administrator needs to ensure all emails sent and received by a specific address are stored in a non-alterable format- Which of the following best describes this forensic concept?. E-discovery. Acquisition. Legal hold. Chain of custody. Which of the following should a systems administrator do after performing remediation activities?. Classify. Archive. Rescan. Isolate. Which of the following is a technical security control?. Security guard. Policy. Fence. Firewall. A user attempts to send an invoice to a customer. When the user follows up with the customer to see if the invoice was received, the customer informs the user that it went to the spam folder. The management team has asked the systems administrator to implement measures to reduce the likelihood of this happening again by implementing server authentication. Which of the following should the systems administrator implement?. SPF. DMARC. XDR. DNSSEC. An employee receives from a vendor a marketing communication email that includes an attachment. When the employee opens the attachment, the employee's screen displays Odd text requesting payment in order to recover data. Within moments, a company-wide email is sent to employees requesting that employees disconnect their computers from the internet and shut them down. Which of the following describes this type of malware?. Trojan. Worm. Ransomware. Virus. A company recently purchased a new building that does not have an existing wireless or wired infrastructure. A network engineer at the company needs to determine the placement of the access points in the new building. Which of the following accurately describes the task the network engineer will be performing?. Heat map. Internal assessment. Corporate reconnaissance. Site survey. An organization wants to increase an application's resiliency by configuring access to multiple servers in the organization's geographically dispersed environment. Which of the following best describes this architecture?. Containerized. Multitenant. Load balanced. Virtualized. A company/s leadership team wants to ensure employees only print business-related documents on company printers. Which of the following documents should the company add this directive to?. Information security policy. Data classification policy. Business continuity plan. Acceptable use policy. A user sends an email that includes a digital signature for validation. Which of the following security concepts would ensure a user cannot deny they sent the email?. Non-repudiation. Confidentiality. Integrity. Authentication. A systems administrator wants to use a technical solution to explicitly define file permissions for the entire team. Which of the following should the administrator implement?. ACL. Monitoring. Isolation. HIPS. A vendor salesperson is a personal friend of a company/s Chief Financial Officer (CFO). The company recently made a large purchase from the vendor, which was directly approved by the CFO. Which of the following best describes this situation?. Rules of engagement. Conflict of interest. Due diligence. Contractual impact. Reputational damage. During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability?. Race condition. Memory injection. Malicious update. Side loading. Which of the following options most efficiently maintains a system state in the event of a system failure?. Hybrid Cloud. Cold site. Full backup. Load balancing. A company is concerned with supply Chain compromise of new servers and wants to limit this risk. Which of the following should the company review first?. Sanitization procedure. Acquisition process. Change management. Asset tracking. Which of the following would help reduce alert fatigue?. Penetration testing. Compensating controls. Rule tuning. Log aggregation. An organization decides that most employees will work remotely. The existing VPN solution does not have adequate bandwidth, and the content filtering proxy is on premises. Which of the following strategies will enable the business to securely achieve its objective while also being prepared to quickly scale for growth?. Integrate with an SASE platform, and deploy the agent to all laptops. Purchase a larger internet circuit, and create a NAT policy for the proxy. Purchase a SOAR solution to decrease response times for remote workers. Install a secondary VPN and proxy at the disaster recovery site, and automate failover. The board of a company needs to tell the leadership team which activities are too risky to undertake during business operations. Which of the following risk management strategies does the board need to explain to the leadership team?. The company’s risk assessment. The company’s risk acceptance. The company’s risk register. The company’s risk tolerance. A company/s accounts payable clerk receives a message from a vendor asking to change their bank account before paying an invoice. The clerk makes the change and sends the payment to the new account. Days later, the clerk receives another message from the same vendor with a request for a missing payment to the original bank account. Which of the following has most likely occurred?. Phishing campaign. Data exfiltration. Pretext calling. Business email compromise. Which of the following is the most likely reason a security analyst would review SIEM logs?. To check for recent password reset attempts. To monitor for potential DDoS attacks. To assess the scope of a privacy breach. To see correlations across multiple hosts. Which of the following security controls is a company implementing by deploying HIPS? (Choose two.). Directive. Preventive. physical. Corrective. Compensating. Detective. Which of the following policies outlines What employees can and cannot do on company-issued devices?. Acceptable use. Data classification. Change management. Business continuity. Which of the following data types relates to data sovereignty?. Data classified as public in Other countries. Personally identifiable data while traveling. Health data shared between doctors in Other nations. Data at rest outside of a country’s borders. A penetration test reveals that users can easily access internal VLANs from the company’s guest Wi-Fi. Which of the following security principles would remediate this vulnerability by improving network authentication mechanisms?. VLAN ACLs. Captive portal. DNSSEC. 802.1X. A company recently set up a system for employees to access their files remotely. However, the IT team has noticed that some employees are using personal devices to access the system. Which of the following security techniques could help mitigate the risk of unauthorized connections by personal devices?. Multifactor Authentication. Conditional Access Policies. Cloud Access Security Broker. Data Loss Prevention. A software developer wishes to implement an application security technique that will provide assurance of the application's integrity. Which of the following techniques will achieve this?. Secure cookies. Input validation. Static analysis. Code signing. Which of the following are the best methods for hardening end user devices? (Choose two). Full disk encryption. Group-level permissions. Account lockout. Endpoint protection. Proxy server. Segmentation. Which of the following control types involves restricting IP connect to a route is web management interface to protect it from being exploited by a vulnerability?. Corrective. Physical. Preventive. Managerial. Which of the following is the best physical security measure that prevents unauthorized vehicles from entering a data center while still allowing foot traffic?. Access control vestibules. Fencing. Video surveillance. Retractable bollards. A security analyst receives an alert from a front-end web server connected to a database back end. The alert contains the following logs: Image Which of the following attacks is occurring?. Buffer overflow. Brute-force. Injection. Replay. |




