Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA SY0-601 Practice Exam with Questions & Answers | Set: 10

Questions 181

While reviewing pcap data, a network security analyst is able to locate plaintext usernames and passwords being sent from workstations to network witches. Which of the following is the security analyst MOST likely observing?

Options:
A.

SNMP traps

B.

A Telnet session

C.

An SSH connection

D.

SFTP traffic

CompTIA SY0-601 Premium Access
Questions 182

A customer has reported that an organization's website displayed an image of a smiley (ace rather than the expected web page for a short time two days earlier. A security analyst reviews log tries and sees the following around the lime of the incident:

SY0-601 Question 182

Which of the following is MOST likely occurring?

Options:
A.

Invalid trust chain

B.

Domain hijacking

C.

DNS poisoning

D.

URL redirection

Questions 183

A network analyst is setting up a wireless access point for a home office in a remote, rural location. The requirement is that users need to connect to the access point securely but do not want to have to remember passwords Which of the following should the network analyst enable to meet the requirement?

Options:
A.

MAC address filtering

B.

802.1X

C.

Captive portal

D.

WPS

Questions 184

A retail company that is launching @ new website to showcase the company’s product line and other information for online shoppers registered the following URLs:

* www companysite com

* shop companysite com

* about-us companysite com

contact-us. companysite com

secure-logon company site com

Which of the following should the company use to secure its website if the company is concerned with convenience and cost?

Options:
A.

A self-signed certificate

B.

A root certificate

C.

A code-signing certificate

D.

A wildcard certificate

E.

An extended validation certificate

Questions 185

The compliance team requires an annual recertification of privileged and non-privileged user access. However, multiple users who left the company six months ago still have access. Which of the following would have prevented this compliance violation?

Options:
A.

Account audits

B.

AUP

C.

Password reuse

D.

SSO

Questions 186

A bad actor tries to persuade someone to provide financial information over the phone in order to gain access to funds. Which of the following types of attacks does this scenario describe?

Options:
A.

Vishing

B.

Phishing

C.

Spear phishing

D.

Whaling

Questions 187

The Chief Executive Officer announced a new partnership with a strategic vendor and asked the Chief Information Security Officer to federate user digital identities using SAML-based protocols. Which of the following will this enable?

Options:
A.

SSO

B.

MFA

C.

PKI

D.

OLP

Questions 188

Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically. Which of the following concepts does this BEST represent?

Options:
A.

Functional testing

B.

Stored procedures

C.

Elasticity

D.

Continuous integration

Questions 189

A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would BEST meet the requirement?

Options:
A.

Asymmetric

B.

Symmetric

C.

Homomorphic

D.

Ephemeral

Questions 190

A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?

Options:
A.

Dictionary

B.

Rainbow table

C.

Spraying

D.

Brute-force

Questions 191

A systems analyst determines the source of a high number of connections to a web server that were initiated by ten different IP addresses that belong to a network block in a specific country. Which of the following techniques will the systems analyst MOST likely implement to address this issue?

Options:
A.

Content filter

B.

SIEM

C.

Firewall rules

D.

DLP

Questions 192

When planning to build a virtual environment, an administrator need to achieve the following,

•Establish polices in Limit who can create new VMs

•Allocate resources according to actual utilization‘

•Require justification for requests outside of the standard requirements.

•Create standardized categories based on size and resource requirements

Which of the following is the administrator MOST likely trying to do?

Options:
A.

Implement IaaS replication

B.

Product against VM escape

C.

Deploy a PaaS

D.

Avoid VM sprawl

Questions 193

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

Options:
A.

Hashing

B.

DNS sinkhole

C.

TLS inspection

D.

Data masking

Questions 194

A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host:

SY0-601 Question 194

Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?

Options:
A.

Denial of service

B.

ARP poisoning

C.

Command injection

D.

MAC flooding

Questions 195

The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls. This is an example of:

Options:
A.

prepending.

B.

an influence campaign.

C.

a watering-hole attack.

D.

intimidation.

E.

information elicitation.

Questions 196

As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops The review yielded the following results.

• The exception process and policy have been correctly followed by the majority of users

• A small number of users did not create tickets for the requests but were granted access

• All access had been approved by supervisors.

• Valid requests for the access sporadically occurred across multiple departments.

• Access, in most cases, had not been removed when it was no longer needed

Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?

Options:
A.

Create an automated, monthly attestation process that removes access if an employee's supervisor denies the approval

B.

Remove access for all employees and only allow new access to be granted if the employee's supervisor approves the request

C.

Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team

D.

Implement a ticketing system that tracks each request and generates reports listing which employees actively use USB storage devices

Questions 197

A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?

Options:
A.

Default system configuration

B.

Unsecure protocols

C.

Lack of vendor support

D.

Weak encryption

Questions 198

Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?

Options:
A.

Identify theft

B.

Data loss

C.

Data exfiltration

D.

Reputation

Questions 199

A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?

Options:
A.

Default system configuration

B.

Unsecure protocols

C.

Lack of vendor support

D.

Weak encryption

Questions 200

Which of the following roles would MOST likely have direct access to the senior management team?

Options:
A.

Data custodian

B.

Data owner

C.

Data protection officer

D.

Data controller