Free CompTIA SY0-701 Exam Questions (page: 28)

Which of the following cryptographic solutions protects data at rest?

  1. Digital signatures
  2. Full disk encryption
  3. Private key
  4. Steganography

Answer(s): B

Explanation:

Full disk encryption (FDE) secures data at rest by encrypting the entire storage drive, ensuring that data is protected when the system is powered off or if the drive is accessed without authorization. This approach is commonly used to protect sensitive data stored on devices like laptops, servers, and storage media.



Which of the following should an organization use to protect its environment from external attacks conducted by an unauthorized hacker?

  1. ACL
  2. IDS
  3. HIDS
  4. NIPS

Answer(s): D

Explanation:

A Network Intrusion Prevention System (NIPS) actively monitors network traffic and can detect and block malicious activities in real-time, helping to prevent external attacks. Unlike IDS, which only detects intrusions, NIPS can take immediate action to stop threats, making it a strong defensive measure against unauthorized external attacks.



Which of the following would enable a data center to remain operational through a multiday power outage?

  1. Generator
  2. Uninterruptible power supply
  3. Replication
  4. Parallel processing

Answer(s): A

Explanation:

A generator can provide continuous power for extended periods during a power outage, as long as it has sufficient fuel. Unlike an Uninterruptible Power Supply (UPS), which is typically used to bridge short power interruptions, a generator is designed to sustain operations over longer durations, making it ideal for keeping a data center functional during a multiday outage.



A company installed cameras and added signs to alert visitors that they are being recorded.
Which of the following controls did the company implement? (Choose two.)

  1. Directive
  2. Deterrent
  3. Preventive
  4. Detective
  5. Corrective
  6. Technical

Answer(s): B,D



Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

  1. Public key infrastructure
  2. Open public ledger
  3. Public key encryption
  4. Key escrow

Answer(s): D

Explanation:

Key escrow involves storing the encryption key with a trusted third party or system that securely retains the key and grants access to authorized entities as needed. This approach ensures that multiple authorized parties can access the key in a controlled and secure manner, making it a reliable solution for shared access requirements.



Viewing page 28 of 145
Viewing questions 109 - 112 out of 716 questions



Post your Comments and Discuss CompTIA SY0-701 exam prep with other Community members:

SY0-701 Exam Discussions & Posts