CompTIA Security+ Certification - SY0-701 Exam Practice Test

Which of the following activities is the first stage in the incident response process?
Correct Answer: D
A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
Correct Answer: A
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?
Correct Answer: A
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
An engineer has ensured that the switches are using the latest OS, the servers have the latest patches, and the endpoints' definitions are up to date. Which of the following will these actions most effectively prevent?
Correct Answer: A
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
A user is attempting to patch a critical system, but the patch fails to transfer. Which of the following access controls is most likely inhibiting the transfer?
Correct Answer: B
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?
Correct Answer: D
Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).
Correct Answer: A
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).
Correct Answer: B,F
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
Which of the following is an example of memory injection?
Correct Answer: D
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?
Correct Answer: C
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
Company A jointly develops a product with Company B, which is located in a different country. Company A finds out that their intellectual property is being shared with unauthorized companies. Which of the following has been breached?
Correct Answer: C
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network.
Which of the following should be configured on the existing network infrastructure to best prevent this activity?
Correct Answer: D
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).
Which of the following must be considered when designing a high-availability network? (Select two).
Correct Answer: C,E
Explanation: Only visible for ExamsLabs members. You can sign-up / login (it's free).