Free CompTIA SY0-701 Exam Questions (page: 26)

A database administrator is updating the company’s SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?

  1. Hashing
  2. Obfuscation
  3. Tokenization
  4. Masking

Answer(s): C

Explanation:

Tokenization replaces sensitive data, like credit card information, with a unique identifier (token) that has no exploitable value outside of a specific context. This approach is widely used to secure payment card information and reduces the risk of exposure in case of a breach, as the actual credit card data is not stored in the database.



Which of the following is a benefit of vendor diversity?

  1. Patch availability
  2. Zero-day resiliency
  3. Secure configuration guide applicability
  4. Load balancing

Answer(s): B

Explanation:

Vendor diversity can help mitigate the impact of zero-day vulnerabilities. By using multiple vendors for similar services or components, organizations reduce the likelihood that a single vulnerability affecting one vendor's products will compromise the entire system. This diversity creates resilience against attacks exploiting unknown vulnerabilities in any single vendor's software.



An employee used a company’s billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?

  1. Application logs
  2. Vulnerability scanner logs
  3. IDS/IPS logs
  4. Firewall logs

Answer(s): A

Explanation:

Application logs will contain records of activities within the billing system, including transactions, actions taken by users, and any anomalies. This is the most direct source of evidence for tracing fraudulent activity within the specific application, such as issuing unauthorized checks.



An organization is looking to optimize its environment and reduce the number of patches necessary for operating systems. Which of the following will best help to achieve this objective?

  1. Microservices
  2. Virtualization
  3. Real-time operating system
  4. Containers

Answer(s): D

Explanation:

Containers package applications with only the necessary components and dependencies, which reduces the footprint of the operating system components in each instance. This approach minimizes the number of OS patches required, as each container runs only essential services instead of a full OS environment, making it easier to isolate and update application dependencies without affecting the host or requiring frequent OS-level patches.



Which of the following tasks is typically included in the BIA process?

  1. Estimating the recovery time of systems
  2. Identifying the communication strategy
  3. Evaluating the risk management plan
  4. Establishing the backup and recovery procedures
  5. Developing the incident response plan

Answer(s): A

Explanation:

In a BIA, estimating the recovery time of systems, also known as the Recovery Time Objective (RTO), is crucial. The BIA process focuses on identifying critical systems, understanding the impact of their unavailability, and determining acceptable downtime. This helps in planning for recovery times, resource allocation, and continuity strategies.



Viewing page 26 of 138



Post your Comments and Discuss CompTIA SY0-701 exam prep with other Community members:

SY0-701 Exam Discussions & Posts