100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

SY0-701 Practice Exam Questions and Answers 100% CORRECT SOLUTION

Puntuación
-
Vendido
-
Páginas
19
Grado
A+
Subido en
17-05-2024
Escrito en
2023/2024

Question # 1 While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue? Options: A.   Documenting the new policy in a change request and submitting the request to change management B.   Testing the policy in a non-production environment before enabling the policy in the production network C.   Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy D.   Including an 'allow any1 policy above the 'deny any* policy Question # 2 An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.) Options: A.   Typosquatting B.   Phishing C.   Impersonation D.   Vishing E.   Smishing F.   Misinformation Question # 3 A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source? Options: A.   Application B.   IPS/IDS C.   Network D.   Endpoint Question # 4 A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers? Options: A.   Jump server B.   RADIUS C.   HSM D.   Load balancer Question # 5 Which of the following allows for the attribution of messages to individuals? Options: A.   Adaptive identity B.   Non-repudiation C.   Authentication D.   Access logs Question # 6 The management team notices that new accounts that are set up manually do not always have correct access or permissions. CONTINUED.....

Mostrar más Leer menos
Institución
Grado










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Grado

Información del documento

Subido en
17 de mayo de 2024
Número de páginas
19
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Question # 1

While troubleshooting a firewall configuration, a technician determines that a “deny
any” policy should be added to the bottom of the ACL. The technician updates the
policy, but the new policy causes several company servers to become unreachable.

Which of the following actions would prevent this issue?

Options:

A.

Documenting the new policy in a change request and submitting the request to change
management

B.

Testing the policy in a non-production environment before enabling the policy in the
production network

C.

Disabling any intrusion prevention signatures on the 'deny any* policy prior to
enabling the new policy

D.

Including an 'allow any1 policy above the 'deny any* policy

Question # 2

An employee receives a text message that appears to have been sent by the payroll
department and is asking for credential verification. Which of the following social
engineering techniques are being attempted? (Choose two.)

Options:

A.

Typosquatting

,B.

Phishing

C.

Impersonation

D.

Vishing

E.

Smishing

F.

Misinformation

Question # 3

A security analyst is reviewing alerts in the SIEM related to potential malicious
network traffic coming from an employee’s corporate laptop. The security analyst has
determined that additional data about the executable running on the machine is
necessary to continue the investigation. Which of the following logs should the
analyst use as a data source?

Options:

A.

Application

B.

IPS/IDS

C.

Network

D.

Endpoint

Question # 4

, A company prevented direct access from the database administrators’ workstations to
the network segment that contains database servers. Which of the following should a
database administrator use to access the database servers?

Options:

A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

Question # 5

Which of the following allows for the attribution of messages to individuals?

Options:

A.

Adaptive identity

B.

Non-repudiation

C.

Authentication

D.

Access logs

Question # 6

The management team notices that new accounts that are set up manually do not
always have correct access or permissions.
$10.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
munyuabeatrice92

Conoce al vendedor

Seller avatar
munyuabeatrice92 K
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
2 año
Número de seguidores
1
Documentos
347
Última venta
1 año hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes