Discount Offer
Go Back on SY0-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

SY0-701 Practice Test


Page 4 out of 78 Pages

You are the security analyst overseeing a Security Information and Event Management (SIEM) system deployment. The CISO has concerns about negatively impacting the system resources on individual computer systems. Which would minimize the resource usage on individual computer systems while maintaining effective data collection?


A. Deploying additional SIEM systems to distribute the data collection load


B. Using a sensor based collection method on the computer systems


C. Implementing an agentless collection method on the computer systems


D. Running regular vulnerability scans on the computer systems to optimize their performance





C.
  Implementing an agentless collection method on the computer systems

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?


A. MSA


B. SLA


C. BPA


D. SOW





D.
  SOW

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?


A. VM escape


B. SQL injection


C. Buffer overflow


D. Race condition





C.
  Buffer overflow

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?


A. Clustering servers


B. Geographic dispersion


C. Load balancers


D. Off-site backups





B.
  Geographic dispersion

A company wants to get alerts when others are researching and doing reconnaissance on the company One approach would be to host a part of the Infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach?


A. Watering hole


B. Bug bounty


C. DNS sinkhole


D. Honeypot





D.
  Honeypot

Explanation: A honeypot is a security mechanism set up to attract and detect potential attackers by simulating vulnerable assets. By hosting a part of the infrastructure online with known vulnerabilities that appear to be company assets, the company can observe and analyze the behavior of attackers conducting reconnaissance. This approach allows the company to get alerts and gather intelligence on potential threats.
References = CompTIA Security+ SY0-701 study materials, particularly on threat detection techniques such as honeypots.


Page 4 out of 78 Pages
Previous