Test SY0-701

Question 1:
A client demands at least 99.99% uptime from a service provider's hosted security services. Which of the following documents includes the information the service provider should return to the client?

A.
MOA
B.
SOW
C.
MOU
D.
SLA

Question 2:
A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Choose two.)

A.
Key escrow
B.
TPM presence
C.
Digital signatures
D.
Data tokenization
E.
Public key management
F.
Certificate authority linking

Question 3:
Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

A.
Remote access points should fail closed.
B.
Logging controls should fail open.
C.
Safety controls should fail open.
D.
Logical security controls should fail closed.

Question 4:
A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?

A.
A worm is propagating across the network.
B.
Data is being exfiltrated.
C.
A logic bomb is deleting data.
D.
Ransomware is encrypting files.

Question 5:
A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

A.
Default credentials
B.
Non-segmented network
C.
Supply chain vendor
D.
Vulnerable software

Question 6:
A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

A.
Zero Trust
B.
AAA
C.
Non-repudiation
D.
CIA

Question 7:
Which of the following is the most common data loss path for an air-gapped network?

A.
Bastion host
B.
Unsecured Bluetooth
C.
Unpatched OS
D.
Removable devices

Question 8:
A company's marketing department collects, modifies, and stores sensitive customer data. The infrastructure team is responsible for securing the data while in transit and at rest. Which of the following data roles describes the customer?

A.
Processor
B.
Custodian
C.
Subject
D.
Owner

Question 9:
Which of the following would be the best way to handle a critical business application that is running on a legacy server?

A.
Segmentation
B.
Isolation
C.
Hardening
D.
Decommissioning

Question 10:
Which of the following incident response activities ensures evidence is properly handled?

A.
E-discovery
B.
Chain of custody
C.
Legal hold
D.
Preservation

Question 11:
A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

A.
The user jsmith’s account has been locked out.
B.
A keylogger is installed on jsmith’s workstation.
C.
An attacker is attempting to brute force jsmith’s account.
D.
Ransomware has been deployed in the domain.

Disclaimer:
The content on this webpage is collected from various internet sources. While we strive for accuracy, we cannot guarantee its completeness or correctness. Please use it with caution and conduct further research if needed. We do not claim ownership or copyright over any content. If you find any copyrighted material or content that violates laws, please contact us for removal. By accessing this webpage, you agree to these terms. Thank you for your understanding.