Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-601 Practice Exam with Questions & Answers | Set: 2

Questions 21

A security analyst discovers that a company's username and password database were posted on an internet forum. The usernames and passwords are stored in plaintext. Which of the following would mitigate the damage done by this type of data exfiltration in the future?

Options:
A.

Create DLP controls that prevent documents from leaving the network.

B.

Implement salting and hashing.

C.

Configure the web content filter to block access to the forum.

D.

Increase password complexity requirements.

CompTIA SY0-601 Premium Access
Questions 22

Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?

Options:
A.

Web metadata

B.

Bandwidth monitors

C.

System files

D.

Correlation dashboards

Questions 23

An air traffic controller receives a change in flight plan for an morning aircraft over the phone. The air traffic controller compares the change to what

appears on radar and determines the information to be false. As a result, the air traffic controller is able to prevent an incident from occurring. Which of the following is this scenario an example of?

Options:
A.

Mobile hijacking

B.

Vishing

C.

Unsecure VoIP protocols

D.

SPIM attack

Questions 24

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO).

Options:
A.

MAC filtering

B.

Zero trust segmentation

C.

Network access control

D.

Access control vestibules

E.

Guards

F.

Bollards.

Questions 25

Which of the following should a Chief Information Security Officer consider using to take advantage of industry standard guidelines?

Options:
A.

SSAE SOC 2

B.

GDPR

C.

PCI DSS

D.

NIST CSF

Questions 26

Which of the following allow access to remote computing resources, a operating system. and centrdized configuration and data

Options:
A.

Containers

B.

Edge computing

C.

Thin client

D.

Infrastructure as a service

Questions 27

An employee's laptop was stolen last month. This morning, the was returned by the A cyberrsecurity analyst retrieved laptop and has since cybersecurity incident checklist Four incident handlers are responsible for executing the checklist. Which of the following best describes the process for evidence collection assurance?

Options:
A.

Time stamp

B.

Chain of custody

C.

Admissibility

D.

Legal hold

Questions 28

A cybersecurity analyst needs to adopt controls to properly track and log user actions to an individual. Which of the following should the analyst implement?

Options:
A.

Non-repudiation

B.

Baseline configurations

C.

MFA

D.

DLP

Questions 29

An engineer is using scripting to deploy a network in a cloud environment. Which the following describes this scenario?

Options:
A.

SDLC

B.

VLAN

C.

SDN

D.

SDV

Questions 30

Audit logs indicate an administrative account that belongs to a security engineer has been locked out multiple times during the day. The security engineer has been on vacation (or a few days. Which of the following attacks can the account lockout be attributed to?

Options:
A.

Backdoor

B.

Brute-force

C.

Rootkit

D.

Trojan

Questions 31

A corporate security team needs to secure the wireless perimeter of its physical facilities to ensure only authorized users can access corporate resources. Which of the following should the security team do? (Refer the answer from CompTIA SY0-601 Security+ documents or guide at comptia.org)

Options:
A.

Identify rogue access points.

B.

Check for channel overlaps.

C.

Create heat maps.

D.

Implement domain hijacking.

Questions 32

A security analyst needs to recommend a solution that will allow current Active Directory accounts and groups to be used for access controls on both network and remote-access devices. Which of the

following should the analyst recommend? (Select two).

Options:
A.

TACACS+

B.

RADIUS

C.

OAuth

D.

OpenlD

E.

Kerberos

F.

CHAP

Questions 33

Which of the following best describes when an organization Utilizes a read-to-use application from a cloud provider?

Options:
A.

IaaS

B.

SaaS

C.

PaaS

D.

XaaS

Questions 34

A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).

Options:
A.

DLP

B.

MAC filtering

C.

NAT

D.

VPN

E.

Content filler

F.

WAF

Questions 35

A security architect is working on an email solution that will send sensitive data. However, funds are not currently available in the budget for building additional infrastructure. Which of the following should the architect choose?

Options:
A.

POP

B.

IPSec

C.

IMAP

D.

PGP

Questions 36

The findings in a consultant's report indicate the most critical risk to the security posture from an incident response perspective is a lack of workstation and server investigation capabilities. Which of the following should be implemented to remediate this risk?

Options:
A.

HIDS

B.

FDE

C.

NGFW

D.

EDR

Questions 37

The alert indicates an attacker entered thousands of characters into the text box of a web form. The web form was intended for legitimate customers to enter their phone numbers. Which of the attacks has most likely occurred?

Options:
A.

Privilege escalation

B.

Buffer overflow

C.

Resource exhaustion

D.

Cross-site scripting

Questions 38

A company would like to move to the cloud. The company wants to prioritize control and security over cost and ease of management. Which of the following cloud models would best suit this company's priorities?

Options:
A.

Public

B.

Hybrid

C.

Community

D.

Private

Questions 39

Which of the following can reduce vulnerabilities by avoiding code reuse?

Options:
A.

Memory management

B.

Stored procedures

C.

Normalization

D.

Code obfuscation

Questions 40

An account was disabled atter several failed and successful login connections were made from various parts of the Word at various times. A security analysts investigating the issue. Which of the following account policies most likely triggered the action to disable the

Options:
A.

Time based logins

B.

Password history

C.

Geofencing

D.

Impossible travel time