An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?
Answer(s): C
Option C is correct because security awareness training helps users recognize phishing and spoofed websites, reducing clicks on malicious content and supporting safer browsing practices.A) Incorrect — Multifactor authentication protects access to accounts but does not prevent users from visiting or recognizing spoofed sites or reduce the initial exposure from unsafe links.B) Incorrect — Decreasing web filter settings would weaken defenses and likely increase exposure to malicious sites, not address the root cause of user susceptibility.D) Incorrect — Updating the acceptable use policy informs behavior but does not directly improve users’ ability to identify or avoid spoofed websites; training is more effective.
Which of the following teams is best suited to determine whether a company has systems that can be exploited by a potential, identified vulnerability?
Option C is correct because a red team emulates real-world attackers to identify exploitable vulnerabilities and assess impact, confirming whether systems can be compromised. A) Incorrect — Purple teams facilitate collaboration between blue (defense) and red (offense) teams, but do not primarily determine exploitation capabilities alone. B) Incorrect — Blue team focuses on defense, monitoring, and incident response, not offensive exploitation validation. D) Incorrect — White team typically oversees and evaluates events or exercises, not actively performing exploitation testing.
A company is reviewing options to enforce user logins after several account takeovers. The following conditions must be met as part of the solution:Allow employees to work remotely or from assigned offices around the world.Provide a seamless login experience.Limit the amount of equipment required.Which of the following best meets these conditions?
Answer(s): A
Option A is correct because Trusted devices enables seamless, certificate- or policy-based authentication tied to corporate devices, supporting remote and global work with minimal user friction and reduced need for additional equipment. Incorrect – B: Geotagging is metadata-based and not a robust auth method; it’s not a login mechanism and can be spoofed. C: Smart cards require physical card presence and readers, increasing hardware footprint and login steps, contrary to “limit equipment” and seamless access. D: Time-based logins rely on time constraints, not user/device context, and do not address remote/office access or reduce hardware requirements.
Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Choose two.)
Answer(s): C,E
Option C is correct because honeypots lure and attract attackers, allowing detection of unauthorized activity and analysis of attacker behavior within a controlled environment. Option E is correct because a DNS sinkhole redirects or blocks malicious domain requests, enabling detection of compromised hosts communicating with command-and-control or other malicious infrastructure.A) Tokenization — Incorrect: replaces sensitive data with tokens for data at rest/in transit, not for attacker detection.B) CI/CD — Incorrect: relates to software delivery pipelines, not intrusion detection.D) Threat modeling — Incorrect: proactive risk assessment; helps design defenses but not real-time attacker detection.F) Data obfuscation — Incorrect: hides data content; does not detect infiltrators.
A company wants to ensure that the software it develops will not be tampered with after the final version is completed. Which of the following should the company most likely use?
Option A is correct because hashing provides integrity verification to detect tampering by producing a fixed-size digest that changes if the final build is altered. Incorrect — B: Encryption protects confidentiality, not integrity. Incorrect — C: Baselines define standard configurations for comparison, not tamper-evidence after release. Incorrect — D: Tokenization replaces data with tokens for confidentiality, not ensuring software integrity.
An organization completed a project to deploy SSO across all business applications last year. Recently, the finance department selected a new cloud-based accounting software vendor. Which of the following should most likely be configured during the new software deployment?
Answer(s): B
Option B is correct because SAML is a common SSO federation protocol used to authenticate users across cloud-based apps, aligning with the existing SSO deployment. A) RADIUS is for network access authentication, not for web SSO with cloud apps. C) EAP is an authentication framework for network access, not for single sign-on to SaaS. D) OpenID is another SSO protocol, but the question specifies the previously deployed SSO (likely SAML-based), so B fits the established federation approach.
A user, who is waiting for a flight at an airport, logs in to the airline website using the public Wi-Fi, ignores a security warning and purchases an upgraded seat. When the flight lands, the user finds unauthorized credit card charges. Which of the following attacks most likely occurred?
Answer(s): D
Option D is correct because an on-path attack (a form of man-in-the-middle) occurs when an attacker intercepts or alters communications between the user and the service, enabling credential capture and fraudulent charges after the session, especially on insecure public Wi-Fi. Replay attack (A) involves resending captured messages to repeat actions, not necessarily credentials theft during a single session. Memory leak (B) and Buffer overflow (C) are software vulnerabilities causing stability or crashes, not credential theft via network interception. Incorrect — A describes repeated messages, not live tampering; Incorrect — B and C describe flaws in code, not interception of a session. Incorrect — A, B, C do not fit the scenario of on-path credential capture and unauthorized charges.
A network engineer deployed a redundant switch stack to increase system availability. However, the budget can only cover the cost of one ISP connection. Which of the following best describes the potential risk factor?
Option D is correct because a single ISP connection creates a single point of failure in an otherwise redundant switch stack, meaning if the ISP link fails, uptime is impacted despite local redundancy.A) Incorrect — MTBF of equipment being unknown does not describe external connectivity vulnerability; it concerns hardware reliability, not network path redundancy.B) Incorrect — An SLA status from the ISP isn’t specified; the risk here is the lack of redundancy, not contract terms.C) Incorrect — RPO relates to disaster recovery data loss tolerance, not the network path redundancy or link availability.
Share your comments for CompTIA SY0-701 exam with other users:
passed my az-120 certification exam today with 90% marks. studied using the dumps highly recommended to all.
i need it, plz make it available
q47: intrusion prevention system is the correct answer, not patch management. by definition, there are no patches available for a zero-day vulnerability. the way to prevent an attacker from exploiting a zero-day vulnerability is to use an ips.
this is simple but tiugh as well
questão 4, segundo meu compilador local e o site https://www.jdoodle.com/online-java-compiler/, a resposta correta é "c" !
its very useful
i mastered my skills and aced the comptia 220-1102 exam with a score of 920/1000. i give the credit to for my success.
real questions
very helpful assessments
hi there, i would like to get dumps for this exam
i studied for the microsoft azure az-204 exam through it has 100% real questions available for practice along with various mock tests. i scored 900/1000.
please upload 1z0-1072-23 exam dups
i was hoping if you could please share the pdf as i’m currently preparing to give the exam.
i am looking for oracle 1z0-116 exam
where we can get the answer to the questions
nice questions
question 129 is completely wrong.
i need dump
love the site.
can you please upload it back?
could you please re-upload this exam? thanks a lot!
great about shared quiz
goood helping
pay attention to questions. they are very tricky. i waould say about 80 to 85% of the questions are in this exam dump.
wish you would allow more free questions
great simulation
very g inood
q35 should be a
sap c_ts450_2021
ecellent materil for unserstanding
good so far
this is way too informative
very helpfull