Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

SY0-701 Practice Exam Questions and Answers 100% CORRECT SOLUTION

Note
-
Vendu
-
Pages
19
Grade
A+
Publié le
17-05-2024
Écrit en
2023/2024

Question # 1 While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue? Options: A.   Documenting the new policy in a change request and submitting the request to change management B.   Testing the policy in a non-production environment before enabling the policy in the production network C.   Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy D.   Including an 'allow any1 policy above the 'deny any* policy Question # 2 An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.) Options: A.   Typosquatting B.   Phishing C.   Impersonation D.   Vishing E.   Smishing F.   Misinformation Question # 3 A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source? Options: A.   Application B.   IPS/IDS C.   Network D.   Endpoint Question # 4 A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers? Options: A.   Jump server B.   RADIUS C.   HSM D.   Load balancer Question # 5 Which of the following allows for the attribution of messages to individuals? Options: A.   Adaptive identity B.   Non-repudiation C.   Authentication D.   Access logs Question # 6 The management team notices that new accounts that are set up manually do not always have correct access or permissions. CONTINUED.....

Montrer plus Lire moins
Établissement
Cours










Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Cours

Infos sur le Document

Publié le
17 mai 2024
Nombre de pages
19
Écrit en
2023/2024
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

Question # 1

While troubleshooting a firewall configuration, a technician determines that a “deny
any” policy should be added to the bottom of the ACL. The technician updates the
policy, but the new policy causes several company servers to become unreachable.

Which of the following actions would prevent this issue?

Options:

A.

Documenting the new policy in a change request and submitting the request to change
management

B.

Testing the policy in a non-production environment before enabling the policy in the
production network

C.

Disabling any intrusion prevention signatures on the 'deny any* policy prior to
enabling the new policy

D.

Including an 'allow any1 policy above the 'deny any* policy

Question # 2

An employee receives a text message that appears to have been sent by the payroll
department and is asking for credential verification. Which of the following social
engineering techniques are being attempted? (Choose two.)

Options:

A.

Typosquatting

,B.

Phishing

C.

Impersonation

D.

Vishing

E.

Smishing

F.

Misinformation

Question # 3

A security analyst is reviewing alerts in the SIEM related to potential malicious
network traffic coming from an employee’s corporate laptop. The security analyst has
determined that additional data about the executable running on the machine is
necessary to continue the investigation. Which of the following logs should the
analyst use as a data source?

Options:

A.

Application

B.

IPS/IDS

C.

Network

D.

Endpoint

Question # 4

, A company prevented direct access from the database administrators’ workstations to
the network segment that contains database servers. Which of the following should a
database administrator use to access the database servers?

Options:

A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

Question # 5

Which of the following allows for the attribution of messages to individuals?

Options:

A.

Adaptive identity

B.

Non-repudiation

C.

Authentication

D.

Access logs

Question # 6

The management team notices that new accounts that are set up manually do not
always have correct access or permissions.
€9,73
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
munyuabeatrice92

Faites connaissance avec le vendeur

Seller avatar
munyuabeatrice92 K
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
1
Membre depuis
2 année
Nombre de followers
1
Documents
347
Dernière vente
1 année de cela

0,0

0 revues

5
0
4
0
3
0
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions