CompTIA Security+ SY0-701 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Security+ SY0-701 Free...
CompTIA Security+ SY0-701 certification promotion with the logo, headline 'Pass in 3 Days' and 'Pay After You Pass' button, on a clean white background.

Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!

Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!

 

Question 191
0
Please leave a feedback on thisx

A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?

  • A. IPS
  • B. Firewall
  • C. AСL
  • D. Windows security

 

 

 

 

Question 192
0
Please leave a feedback on thisx

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

  • A. Business continuity
  • B. Physical security
  • C. Change management
  • D. Disaster recovery

 

 

 

Question 193
0
Please leave a feedback on thisx

A business needs a recovery site but does not require immediate failover. The business also wants to reduce the workload required to recover from an outage. Which of the following recovery sites is the best option?

  • A. Hot
  • B. Cold
  • C. Warm
  • D. Geographically dispersed

 

 

 

Question 194
0
Please leave a feedback on thisx

A security team is setting up a new environment for hosting the organization’s on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?

  • A. Virtualization and isolation of resources
  • B. Network segmentation
  • C. Data encryption
  • D. Strong authentication policies

 

 

 

 

Question 195
0
Please leave a feedback on thisx

A manager receives an email that contains a link to receive a refund. After hovering over the link, the manager notices that the domain’s URL points to a suspicious link. Which of the following security practices helped the manager to identify the attack?

  • A. End user training
  • B. Policy review
  • C. URL scanning
  • D. Plain text email

 

 

 

Question 196
0
Please leave a feedback on thisx

A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?

  • A. Validate the code signature.
  • B. Execute the code in a sandbox.
  • C. Search the executable for ASCII strings.
  • D. Generate a hash of the files.

 

 

Question 197
0
Please leave a feedback on thisx

A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?

  • A. Installing HIDS on the system
  • B. Placing the system in an isolated VLAN
  • C. Decommissioning the system
  • D. Encrypting the system’s hard drive

 

 

 

Question 198
0
Please leave a feedback on thisx

The Chief Information Security Officer (CISO) at a large company would like to gain an understanding of how the company’s security policies compare to the requirements imposed by external regulators. Which of the following should the CISO use?

  • A. Penetration test
  • B. Internal audit
  • C. Attestation
  • D. External examination

 

 

 

Question 199
0
Please leave a feedback on thisx

A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?

  • A. Espionage
  • B. Data exfiltration
  • C. Nation-state attack
  • D. Shadow IT

 

 

 

Question 200
0
Please leave a feedback on thisx

The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?

  • A. Shadow IT
  • B. Insider threat
  • C. Data exfiltration
  • D. Service disruption

 

 

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!