100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SY0-701 Practice Exam Questions and Answers 100% CORRECT SOLUTION

Beoordeling
-
Verkocht
-
Pagina's
19
Cijfer
A+
Geüpload op
17-05-2024
Geschreven in
2023/2024

Question # 1 While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue? Options: A.   Documenting the new policy in a change request and submitting the request to change management B.   Testing the policy in a non-production environment before enabling the policy in the production network C.   Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy D.   Including an 'allow any1 policy above the 'deny any* policy Question # 2 An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.) Options: A.   Typosquatting B.   Phishing C.   Impersonation D.   Vishing E.   Smishing F.   Misinformation Question # 3 A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source? Options: A.   Application B.   IPS/IDS C.   Network D.   Endpoint Question # 4 A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers? Options: A.   Jump server B.   RADIUS C.   HSM D.   Load balancer Question # 5 Which of the following allows for the attribution of messages to individuals? Options: A.   Adaptive identity B.   Non-repudiation C.   Authentication D.   Access logs Question # 6 The management team notices that new accounts that are set up manually do not always have correct access or permissions. CONTINUED.....

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Question # 1

While troubleshooting a firewall configuration, a technician determines that a “deny
any” policy should be added to the bottom of the ACL. The technician updates the
policy, but the new policy causes several company servers to become unreachable.

Which of the following actions would prevent this issue?

Options:

A.

Documenting the new policy in a change request and submitting the request to change
management

B.

Testing the policy in a non-production environment before enabling the policy in the
production network

C.

Disabling any intrusion prevention signatures on the 'deny any* policy prior to
enabling the new policy

D.

Including an 'allow any1 policy above the 'deny any* policy

Question # 2

An employee receives a text message that appears to have been sent by the payroll
department and is asking for credential verification. Which of the following social
engineering techniques are being attempted? (Choose two.)

Options:

A.

Typosquatting

,B.

Phishing

C.

Impersonation

D.

Vishing

E.

Smishing

F.

Misinformation

Question # 3

A security analyst is reviewing alerts in the SIEM related to potential malicious
network traffic coming from an employee’s corporate laptop. The security analyst has
determined that additional data about the executable running on the machine is
necessary to continue the investigation. Which of the following logs should the
analyst use as a data source?

Options:

A.

Application

B.

IPS/IDS

C.

Network

D.

Endpoint

Question # 4

, A company prevented direct access from the database administrators’ workstations to
the network segment that contains database servers. Which of the following should a
database administrator use to access the database servers?

Options:

A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

Question # 5

Which of the following allows for the attribution of messages to individuals?

Options:

A.

Adaptive identity

B.

Non-repudiation

C.

Authentication

D.

Access logs

Question # 6

The management team notices that new accounts that are set up manually do not
always have correct access or permissions.

Geschreven voor

Vak

Documentinformatie

Geüpload op
17 mei 2024
Aantal pagina's
19
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
munyuabeatrice92

Maak kennis met de verkoper

Seller avatar
munyuabeatrice92 K
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1
Lid sinds
2 jaar
Aantal volgers
1
Documenten
347
Laatst verkocht
1 jaar geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen