Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA SY0-601 Practice Exam with Questions & Answers | Set: 7

Questions 121

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

Options:
A.

Bollards

B.

Access badge

C.

Motion sensor

D.

Video surveillance

CompTIA SY0-601 Premium Access
Questions 122

Which of the following is the most important security concern when using legacy systems to provide production service?

Options:
A.

Instability

B.

Lack of vendor support

C.

Loss of availability

D.

Use of insecure protocols

Questions 123

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?

Options:
A.

A thorough analysis of the supply chain

B.

A legally enforceable corporate acquisition policy

C.

A right to audit clause in vendor contracts and SOWs

D.

An in-depth penetration test of all suppliers and vendors

Questions 124

A penetration test revealed that several Linux servers were misconfigured at the file level and access was granted incorrectly. A security analyst is referencing the instructions in the incident response runbook for remediation information. Which of the following is the best command to use to resolve the issue?

Options:
A.

chmod

B.

cat

C.

grep

D.

dig

Questions 125

An audit identified Pll being utilized in the development environment of a critical application The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers state that they require real data to perform developmental and functionality tests. Which of the following should a security professional implement to best satisfy both the CPO's and the development team's requirements?

Options:
A.

Data purge

B.

Data encryption

C.

Data masking

D.

Data totalization

Questions 126

A systems administrator wants to add a second factor to the single sign-on portal that the organization uses. Currently, only a username and password are required. Which of the following should the administrator implement to best meet this requirement?

Options:
A.

Personal verification questions

B.

Software-based TOTP

C.

Log-in image checks

D.

Secondary PIN code

Questions 127

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

Options:
A.

The device has been moved from a production environment to a test environment.

B.

The device is configured to use cleartext passwords.

C.

The device is moved to an isolated segment on the enterprise network.

D.

The device is moved to a different location in the enterprise.

E.

The device’s encryption level cannot meet organizational standards.

F.

The device is unable to receive authorized updates.

Questions 128

After a web server was migrated to a cloud environment, user access to that server was blocked. Even though an on-premises firewall configuration has been modified to reflect the cloud infrastructure, users are still experiencing access issues. Which of the following most likely needs to be configured?

Options:
A.

Security group

B.

Load balancer pool

C.

Resource allocation

D.

Storage permissions

E.

URL filter

Questions 129

A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

Options:
A.

Data retention

B.

Certification

C.

Destruction

D.

Classification

E.

Sanitization

F.

Enumeration

Questions 130

An organization with high security needs is concerned about unauthorized exfiltration of data via Wi-Fi from within a secure facility. Which of the following security controls should the company implement?

Options:
A.

Air-gapped network

B.

Faraday cage

C.

Screened subnet

D.

802.1X certificates

Questions 131

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?

Options:
A.

Prepara

B.

Recovery

C.

Lessons learned

D.

Analysis

Questions 132

Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?

Options:
A.

Hacktivist

B.

Whistleblower

C.

Organized crime

D.

Unskilled attacker

Questions 133

Which of the following is the best resource to consult for information on the most common application exploitation methods?

Options:
A.

OWASP

B.

k STIX

C.

OVAL

D.

Threat intelligence feed

E.

Common Vulnerabilities and Exposures

Questions 134

A security analyst is responding to a malware incident at a company. The malware connects to a command-and-control server on the internet in order to function. Which of the following should the security analyst implement first?

Options:
A.

Network segmentation

B.

IP-based firewall rules

C.

Mobile device management

D.

Content filter

Questions 135

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

Options:
A.

To track the status of patching installations

B.

To find shadow IT cloud deployments

C.

To continuously the monitor hardware inventory

D.

To hunt for active attackers in the network

Questions 136

Users are reporting performance issues from a specific application server. A security administrator are administrator is originating from. Which of the following types of log files should be used to capture this information?

Options:
A.

Session traffic

B.

Syslog data

C.

Security events

D.

DNS responses

E.

Authentication

Questions 137

A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work. Which of the following is the best option?

Options:
A.

Send out periodic security reminders.

B.

Update the content of new hire documentation.

C.

Modify the content of recurring training.

D.

Implement a phishing campaign

Questions 138

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

Options:
A.

Penetration test

B.

Continuity of operations planning

C.

Tabletop exercise

D.

Simulation

Questions 139

Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?

Options:
A.

Impact analysis

B.

Scheduled downtime

C.

Blackout plan

D.

Change management boards

Questions 140

Which of the following ensures an organization can continue to do business with minimal interruption in the event of a major disaster?

Options:
A.

Business recovery plan

B.

Incident response plan

C.

Communication plan

D.

Continuity of operations plan