Free SY0-701 Exam Braindumps (page: 16)

Page 15 of 138

Which of the following can be used to identify potential attacker activities without affecting production servers?

  1. Honeypot
  2. Video surveillance
  3. Zero Trust
  4. Geofencing

Answer(s): A



During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?

  1. Analysis
  2. Lessons learned
  3. Detection
  4. Containment

Answer(s): A



A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?

  1. Conduct an audit.
  2. Initiate a penetration test.
  3. Rescan the network.
  4. Submit a report.

Answer(s): C



An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.
Which of the following best describes the user’s activity?

  1. Penetration testing
  2. Phishing campaign
  3. External audit
  4. Insider threat

Answer(s): D






Post your Comments and Discuss CompTIA SY0-701 exam with other Community members:

SY0-701 Discussions & Posts