Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-601 Practice Exam with Questions & Answers | Set: 6

Questions 101

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

Options:
A.

Secure cookies

B.

Version control

C.

Input validation

D.

Code signing

CompTIA SY0-601 Premium Access
Questions 102

An analyst is reviewing log data from a SIEM alert about a suspicious event Threat intelligence indicates threats from domains originating in known malicious countries The analyst examines the following data.

SY0-601 Question 102

The Chief information Security Officer asks the analyst determine whether the SIEM alerts can be attributed to the domains m the threat intelligence report. Which of the following tools would b«ii allow the analyst to make this determination?

Options:
A.

nsleskup

B.

netstat

C.

curl

D.

arp

Questions 103

A spoofed identity was detected for a digital certificate. Which of the following are the type of unidentified key and the certificate that could be in use on the company domain?

Options:
A.

Private key and root certificate

B.

Public key and expired certificate

C.

Private key and self-signed certificate

D.

Public key and wildcard certificate

Questions 104

A company is required to perform a risk assessment on an annual basis. Which of the following types of risk assessments does this requirement describe?

Options:
A.

Continuous

B.

Ad hoc

C.

Recurring

D.

One time

Questions 105

Which of the following best describes a social engineering attack that uses a targeted electronic messaging campaign aimed at a Chief Executive Officer?

Options:
A.

Whaling

B.

Spear phishing

C.

Impersonation

D.

Identity fraud

Questions 106

The Chief Information Security Officer wants to put security measures in place to protect Pll. The organization needs to use its existing labeling and classification system to accomplish this goal. Which of the following would most likely be configured to meet the requirements?

Options:
A.

Tokenization

B.

S/MIME

C.

DLP

D.

MFA

Questions 107

An analyst in the human resources organization is responsible for the quality of the company's personnel data. The analyst maintains a data dictionary and ensures it is correct and up to date Which of the following best describes the role of the analyst?

Options:
A.

Data steward

B.

Data owner

C.

Data processor

D.

Data protection officer

Questions 108

A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?

Options:
A.

Hashing

B.

Tokenization

C.

Encryption

D.

Segmentation

Questions 109

An organization received threat intelligence describing an increase in credential harvesting across the industry A security analyst is reviewing the following authentication logs to look for potential Indicators of compromise.

SY0-601 Question 109

Which of the following configurations can help prevent this hype of attack from occurring?

Options:
A.

Blocking malicious IPs

B.

Enabling impossible logins

C.

Deploying privileged access management

D.

Setting the max account lockout threshold

Questions 110

A company hired a security manager from outside the organization to lead security operations. Which of the following actions should the security manager perform first in this new role?

Options:
A.

Establish a security baseline.

B.

Review security policies.

C.

Adopt security benchmarks.

D.

Perform a user ID revalidation.

Questions 111

The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?

Options:
A.

Guard rail script

B.

Ticketing workflow

C.

Escalation script

D.

User provisioning script

Questions 112

Which of the following, if compromised, can indirectly impact systems’ availability by imposing inadequate environmental conditions for the hardware to operate properly?

Options:
A.

SCADA

B.

TPM

C.

HSM

D.

HVAC

Questions 113

An organization is concerned about hackers bypassing MFA through social engineering of phone carriers. Which of the following would most likely protect against such an attack?

Options:
A.

Receiving alerts about unusual log-in activity

B.

Receiving a six-digit code via SMS

C.

Receiving a push notification to a mobile application

D.

Receiving a phone call for automated approval

Questions 114

A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior. Which of the following would be best for the administrator to reference?

Options:
A.

MITRE ATT&CK

B.

CSIRT

C.

CVSS

D.

SOAR

Questions 115

An audit report showed that a former employee saved the following files to an external USB drive before the employee's termination date:

• annual_tax_form.pdf

• encrypted_passwords.db

• team_picture.jpg

• contactjist.db

• human_resources.txt

Which of the following could the former employee do to potentially compromise corporate credentials?

Options:
A.

Perform an offline brute-force attack.

B.

Use the files to create a rainbow table.

C.

Conduct a token replay.

D.

Release a network dictionary attack

Questions 116

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

Options:
A.

Key stretching

B.

Data masking

C.

Steganography

D.

Salting

Questions 117

Following a recent security breach, an analyst discovered that user permissions were added when joining another part of the organization but were not removed from existing groups. Which of the following policies would help to correct these issues in the future?

Options:
A.

Service accounts

B.

Account audits

C.

Password complexity

D.

Lockout policy

Questions 118

A company is providing security awareness training regarding the importance of not forwarding social media messages from unverified sources. Which of the following risks would this training help to prevent?

Options:
A.

Hoaxes

B.

SPIMs

C.

Identity fraud

D.

Credential harvesting

Questions 119

A security team created a document that details the order in which critical systems should be brought back online after a major outage. Which of the following documents did the team create?

Options:
A.

Communication plan

B.

Incident response plan

C.

Data retention policy

D.

Disaster recovery plan

Questions 120

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 802.1X for access control. To be allowed on the network, a device must have a known hardware address, and a valid username and password must be entered in a captive portal. The following is the audit report:

SY0-601 Question 120

Which of the following is the most likely way a rogue device was allowed to connect?

Options:
A.

A user performed a MAC cloning attack with a personal device.

B.

A DHCP failure caused an incorrect IP address to be distributed.

C.

An administrator bypassed the security controls for testing.

D.

DNS hijacking let an attacker intercept the captive portal traffic.