Free SY0-701 Exam Braindumps (page: 7)

Page 6 of 138

During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?

  1. access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32
  2. access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
  3. access-list inbound permit ip source 10.1.4.9/32 destination 0.0.0.0/0
  4. access-list inbound permit ip source 0.0.0.0/0 destination 10.1.4.9/32

Answer(s): B



A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

  1. Implementing a bastion host
  2. Deploying a perimeter network
  3. Installing a WAF
  4. Utilizing single sign-on

Answer(s): A



A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

  1. Application
  2. IPS/IDS
  3. Network
  4. Endpoint

Answer(s): D



A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.
SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

  1. Digital forensics
  2. E-discovery
  3. Incident response
  4. Threat hunting

Answer(s): D






Post your Comments and Discuss CompTIA SY0-701 exam with other Community members:

SY0-701 Discussions & Posts