Free CompTIA SY0-701 Exam Questions (page: 25)

A systems administrator needs to ensure the secure communication of sensitive data within the organization’s private cloud. Which of the following is the best choice for the administrator to implement?

  1. IPSec
  2. SHA-1
  3. RSA
  4. TGT

Answer(s): A

Explanation:

IPSec (Internet Protocol Security) is a suite of protocols designed to secure IP communications by authenticating and encrypting each IP packet in a communication session. It is widely used for securing data transfer in networks, including private clouds, by providing confidentiality, integrity, and authenticity of data.



Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?

  1. Policies and procedures
  2. Asset management
  3. Vulnerability assessment
  4. Business impact analysis

Answer(s): A

Explanation:

Policies and procedures form the foundation of an organization's risk management program. They establish the framework and guidelines for managing risks across the organization, including roles, responsibilities, and the approach for identifying, assessing, and mitigating risks.
Without well-defined policies and procedures, it would be challenging to assess other areas of risk management effectively, as they are all built upon these foundational documents.
Asset management, vulnerability assessment, and business impact analysis are critical components of a risk management program, but they should follow a review of policies and procedures. These documents set the standards and processes that the organization uses to manage assets, assess vulnerabilities, and conduct impact analyses.



Which of the following activities are associated with vulnerability management? (Choose two.)

  1. Reporting
  2. Prioritization
  3. Exploiting
  4. Correlation
  5. Containment
  6. Tabletop exercise

Answer(s): A,B

Explanation:

Reporting involves documenting and communicating the findings of vulnerability scans and assessments. This allows stakeholders to be informed about existing vulnerabilities and track remediation efforts.
Prioritization is the process of ranking vulnerabilities based on their severity, impact, and exploitability, helping the organization address the most critical vulnerabilities first.



An administrator wants to perform a risk assessment without using proprietary company information. Which of the following methods should the administrator use to gather information?

  1. Network scanning
  2. Penetration testing
  3. Open-source intelligence
  4. Configuration auditing

Answer(s): C

Explanation:

Open-source intelligence (OSINT) involves collecting information from publicly available sources, such as websites, social media, news articles, and other publicly accessible databases. OSINT allows an administrator to gather valuable information about potential risks without using any proprietary or internal company information.



A systems administrator is concerned about vulnerabilities within cloud computing instances. Which of the following is most important for the administrator to consider when architecting a cloud computing environment?

  1. SQL injection
  2. TOC/TOU
  3. VM escape
  4. Tokenization
  5. Password spraying

Answer(s): C

Explanation:

In cloud computing, virtual machines (VMs) share physical resources. VM escape is a critical vulnerability where an attacker could break out of a virtualized environment and access the host system or other VMs running on the same physical hardware. This would pose a significant security risk, as it could allow attackers to compromise the entire cloud infrastructure.



Viewing page 25 of 138



Post your Comments and Discuss CompTIA SY0-701 exam prep with other Community members:

SY0-701 Exam Discussions & Posts