Free SY0-701 Exam Braindumps (page: 9)

Page 8 of 150

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

  1. Risk tolerance
  2. Risk transfer
  3. Risk register
  4. Risk analysis

Answer(s): C



Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

  1. Disaster recovery plan
  2. Incident response procedure
  3. Business continuity plan
  4. Change management procedure

Answer(s): D



A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

  1. Open-source intelligence
  2. Bug bounty
  3. Red team
  4. Penetration testing

Answer(s): B



Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

  1. Insider
  2. Unskilled attacker
  3. Nation-state
  4. Hacktivist

Answer(s): C






Post your Comments and Discuss CompTIA SY0-701 exam with other Community members:

SY0-701 Exam Discussions & Posts