nerdexam
CompTIACompTIA

SY0-701 · Question #529

SY0-701 Question #529: Real Exam Question with Answer & Explanation

The correct answer is D: User activity logs. User activity logs are the correct choice because they record what users do on a system - including failed login attempts - giving administrators a paper trail to detect when someone is trying to guess credentials they shouldn't have. Logs are a detective control: they don't stop

Submitted by chiamaka_o· Mar 6, 2026Security operations

Question

A university employee logged on to the academic server and attempted to guess the system administrators' log-in credentials. Which of the following security measures should the university have implemented to detect the employee's attempts to gain access to the administrators' accounts?

Options

  • ATwo-factor authentication
  • BFirewall
  • CIntrusion prevention system
  • DUser activity logs

Explanation

User activity logs are the correct choice because they record what users do on a system - including failed login attempts - giving administrators a paper trail to detect when someone is trying to guess credentials they shouldn't have. Logs are a detective control: they don't stop the attack, but they reveal it happened.

Why the distractors are wrong:

  • A. Two-factor authentication would make guessing harder to succeed, but it's a preventive control, not a detection mechanism - it wouldn't alert anyone that attempts were made.
  • B. Firewall controls network traffic between systems/networks; it doesn't monitor what an already-logged-in internal user does on a server.
  • C. Intrusion prevention system (IPS) is designed to detect and block network-based attacks from outside the perimeter - it typically won't flag an authenticated internal employee trying to access other accounts.

Memory tip: Match the control type to the scenario. The question asks what would detect the attempts - think "D for Detective = D for Data/logs." Logs are always the go-to answer when the threat is an insider and the goal is visibility, not prevention.

Topics

#Security logging#Monitoring#Insider threats#Access control

Community Discussion

No community discussion yet for this question.

Full SY0-701 PracticeBrowse All SY0-701 Questions