100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SY0-701 Practice Exam Questions and Answers 100% CORRECT SOLUTION

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
17-05-2024
Written in
2023/2024

Question # 1 While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue? Options: A.   Documenting the new policy in a change request and submitting the request to change management B.   Testing the policy in a non-production environment before enabling the policy in the production network C.   Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy D.   Including an 'allow any1 policy above the 'deny any* policy Question # 2 An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.) Options: A.   Typosquatting B.   Phishing C.   Impersonation D.   Vishing E.   Smishing F.   Misinformation Question # 3 A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source? Options: A.   Application B.   IPS/IDS C.   Network D.   Endpoint Question # 4 A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers? Options: A.   Jump server B.   RADIUS C.   HSM D.   Load balancer Question # 5 Which of the following allows for the attribution of messages to individuals? Options: A.   Adaptive identity B.   Non-repudiation C.   Authentication D.   Access logs Question # 6 The management team notices that new accounts that are set up manually do not always have correct access or permissions. CONTINUED.....

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
May 17, 2024
Number of pages
19
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Question # 1

While troubleshooting a firewall configuration, a technician determines that a “deny
any” policy should be added to the bottom of the ACL. The technician updates the
policy, but the new policy causes several company servers to become unreachable.

Which of the following actions would prevent this issue?

Options:

A.

Documenting the new policy in a change request and submitting the request to change
management

B.

Testing the policy in a non-production environment before enabling the policy in the
production network

C.

Disabling any intrusion prevention signatures on the 'deny any* policy prior to
enabling the new policy

D.

Including an 'allow any1 policy above the 'deny any* policy

Question # 2

An employee receives a text message that appears to have been sent by the payroll
department and is asking for credential verification. Which of the following social
engineering techniques are being attempted? (Choose two.)

Options:

A.

Typosquatting

,B.

Phishing

C.

Impersonation

D.

Vishing

E.

Smishing

F.

Misinformation

Question # 3

A security analyst is reviewing alerts in the SIEM related to potential malicious
network traffic coming from an employee’s corporate laptop. The security analyst has
determined that additional data about the executable running on the machine is
necessary to continue the investigation. Which of the following logs should the
analyst use as a data source?

Options:

A.

Application

B.

IPS/IDS

C.

Network

D.

Endpoint

Question # 4

, A company prevented direct access from the database administrators’ workstations to
the network segment that contains database servers. Which of the following should a
database administrator use to access the database servers?

Options:

A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

Question # 5

Which of the following allows for the attribution of messages to individuals?

Options:

A.

Adaptive identity

B.

Non-repudiation

C.

Authentication

D.

Access logs

Question # 6

The management team notices that new accounts that are set up manually do not
always have correct access or permissions.
$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
munyuabeatrice92

Get to know the seller

Seller avatar
munyuabeatrice92 K
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
1
Documents
347
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions