Free CompTIA SY0-701 Exam Questions (page: 7)

Which of the following teams is best suited to determine whether a company has systems that can be exploited by a potential, identified vulnerability?

  1. Purple team
  2. Blue team
  3. Red team
  4. White team

Answer(s): C



A company is reviewing options to enforce user logins after several account takeovers. The following conditions must be met as part of the solution:
Allow employees to work remotely or from assigned offices around the world. Provide a seamless login experience.
Limit the amount of equipment required.
Which of the following best meets these conditions?

  1. Trusted devices
  2. Geotagging
  3. Smart cards
  4. Time-based logins

Answer(s): A



Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Choose two.)

  1. Tokenization
  2. CI/CD
  3. Honeypots
  4. Threat modeling
  5. DNS sinkhole
  6. Data obfuscation

Answer(s): C,E



A company wants to ensure that the software it develops will not be tampered with after the final version is completed. Which of the following should the company most likely use?

  1. Hashing
  2. Encryption
  3. Baselines
  4. Tokenization

Answer(s): A



An organization completed a project to deploy SSO across all business applications last year. Recently, the finance department selected a new cloud-based accounting software vendor. Which of the following should most likely be configured during the new software deployment?

  1. RADIUS
  2. SAML
  3. EAP
  4. OpenID

Answer(s): B



Viewing page 7 of 138



Post your Comments and Discuss CompTIA SY0-701 exam prep with other Community members:

SY0-701 Exam Discussions & Posts