Free CompTIA SY0-701 Exam Questions (page: 35)

For which of the following reasons would a systems administrator leverage a 3DES hash from an installer file that is posted on a vendor's website?

  1. To test the integrity of the file
  2. To validate the authenticity of the file
  3. To activate the license for the file
  4. To calculate the checksum of the file

Answer(s): A

Explanation:

A hash (such as one generated using 3DES) is used to verify that the file has not been altered or corrupted during download. By comparing the hash of the downloaded file with the one provided by the vendor, the administrator can confirm the file's integrity.



A company is redesigning its infrastructure and wants to reduce the number of physical servers in use.
Which of the following architectures is best suited for this goal?

  1. Isolation
  2. Segmentation
  3. Virtualization
  4. Redundancy

Answer(s): C

Explanation:

Virtualization allows multiple virtual machines (VMs) to run on a single physical server, reducing the need for multiple physical servers. This approach consolidates workloads, optimizes hardware usage, and lowers operational costs by enabling multiple isolated environments on fewer physical devices.



Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

  1. Availability
  2. Non-repudiation
  3. Integrity
  4. Confidentiality

Answer(s): A

Explanation:

DDoS (Distributed Denial of Service) attacks aim to overwhelm resources and make services unavailable to legitimate users. By implementing protection against DDoS attacks, the organization is focusing on maintaining the availability of its services, ensuring that they remain accessible even in the face of such attacks.



A security manager created new documentation to use in response to various types of security incidents.
Which of the following is the next step the manager should take?

  1. Set the maximum data retention policy.
  2. Securely store the documents on an air-gapped network.
  3. Review the documents' data classification policy.
  4. Conduct a tabletop exercise with the team.

Answer(s): D

Explanation:

A tabletop exercise allows the team to walk through various incident response scenarios using the new documentation, helping to ensure everyone understands their roles and the procedures. This step verifies the effectiveness of the documentation, identifies any gaps, and provides practical experience for the team, which is essential for effective incident response.



After failing an audit twice, an organization has been ordered by a government regulatory agency to pay fines.
Which of the following causes this action?

  1. Non-compliance
  2. Contract violations
  3. Government sanctions
  4. Rules of engagement

Answer(s): A

Explanation:

Failure to meet regulatory standards or requirements (non-compliance) can result in fines and penalties imposed by a government regulatory agency.
When an organization does not comply with mandated regulations or fails audits, it may face financial repercussions to enforce adherence to required standards.



Viewing page 35 of 145
Viewing questions 137 - 140 out of 716 questions



Post your Comments and Discuss CompTIA SY0-701 exam prep with other Community members:

SY0-701 Exam Discussions & Posts