Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA SY0-601 Practice Exam with Questions & Answers | Set: 14

Questions 261

Employees in the research and development business unit receive extensive training 10 ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

Options:
A.

Encrypted

B.

Intellectual property

C.

Critical

D.

Data in transit

CompTIA SY0-601 Premium Access
Questions 262

A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?

Options:
A.

Configuring signature-based antivirus to update every 30 minutes

B.

Enforcing S/MIME for email and automatically encrypting USB drives upon assertion

C.

Implementing application execution in a sandbox for unknown software

D.

Fuzzing new files for vulnerabilities if they are not digitally signed

Questions 263

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?

Options:
A.

A bol

B.

A fileless virus

C.

A logic bomb

D.

A RAT

Questions 264

Which of the following describes the reason root cause analysis should be conducted as part of incident response?

Options:
A.

To gather loCs for the investigation

B.

To discover which systems have been affected

C.

To eradicate any trace of malware on the network

D.

To prevent future incidents of the same nature

Questions 265

The IT department's on-site developer has been with the team for many years. Each lime an application is released; the security team is able to identify multiple vulnerabilities Which of the Mowing would best help the team ensure the application is ready to be released to production?

Options:
A.

Limit the use of third-party libraries.

B.

Prevent data exposure queries.

C.

Obfuscate the source code

D.

Submit the application to OA before releasing it.

Questions 266

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?

Options:
A.

MTTR

B.

RTO

C.

ARO

D.

MTBF

Questions 267

The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?

Options:
A.

Vulnerability scan

B.

Packet capture

C.

Threat feed

D.

User behavior

Questions 268

Which of the following describes the ability of code to target a hypervisor from inside a guest OS?

Options:
A.

Fog computing

B.

VM escape

C.

Software-defined networking

D.

Image forgery

E.

Container breakout

Questions 269

A security analyst is looking for a way to categorize and share a threat actor's TTPs with colleagues at a partner organization. Which of the following would be the best method to achieve this goal?

Options:
A.

Releasing the lessons-learned report

B.

Using the MITRE ATT&CK framework

C.

Sharing the CVE IDs used in attacks

D.

Sending relevant log files and pcaps

Questions 270

A cybersecurity analyst reviews the log files from a web server end sees a series of files that indicate a directory traversal attack has occurred Which of the following is the analyst most likely seeing?

Options:
A.

SY0-601 Question 270 Option 1

B.

270

C.

270

D.

270

Questions 271

An organization suffered numerous multiday power outages at its current location. The Chief Executive Officer wants to create a disaster recovery strategy to resolve this issue. Which of the following options offer low-cost solutions? (Select two).

Options:
A.

Warm site

B.

Generator

C.

Hot site

D.

Cold site

E.

Cloud backups

F.

UPS

Questions 272

An organization is concerned about intellectual property theft by employees who leave the organization Which of the following should the organization most likely implement?

Options:
A.

CBT

B.

NDA

C.

MOU

D.

AUP

Questions 273

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

Options:
A.

Accept

B.

Transfer

C.

Mitigate

D.

Avoid

Questions 274

Which of the following test helps to demonstrate integrity during a forensics investigation?

Options:
A.

Event logs

B.

Encryption

C.

Hashing

D.

Snapshots

Questions 275

An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker most likely attempting?

Options:
A.

A spear-phishing attach

B.

A watering-hole attack

C.

Typo squatting

D.

A phishing attack

Questions 276

A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer data. Which of the following would provide the best proof that the hosting provider has met the requirements?

Options:
A.

NIST CSF

B.

SOC 2 Type 2 report

C.

CIS Top 20 compliance reports

D.

Vulnerability report

Questions 277

Which of the following would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations?

Options:
A.

Machine learning

B.

DNS sinkhole

C.

Blocklist

D.

Honey pot

Questions 278

A user downloaded an extension for a browser, and the user's device later became infected. The analyst who Is Investigating the Incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running:

New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -Driveletter C - FileSystemLabel "New"-FileSystem NTFS - Full -Force -Confirm:$false

Which of the following is the malware using to execute the attack?

Options:
A.

PowerShell

B.

Python

C.

Bash

D.

Macros

Questions 279

Which Of the following is the best method for ensuring non-repudiation?

Options:
A.

SSO

B.

Digital certificate

C.

Token

D.

SSH key

Questions 280

A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

Options:
A.

Improper algorithms security

B.

Tainted training data

C.

virus

D.

Cryptomalware