Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA SY0-601 Practice Exam with Questions & Answers | Set: 8

Questions 141

An auditor discovered multiple insecure pons on some server’s Other servers were found to have legacy protocols enabled. Which of the following tools did the auditor use to discover these issues?

Options:
A.

Nessus

B.

curl

C.

Wireshark

D.

netcat

CompTIA SY0-601 Premium Access
Questions 142

Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

Options:
A.

Air gap

B.

Barricade

C.

Port security

D.

Screened subnet

Questions 143

Which of the following best explains why physical security controls are important in creating a secure environment?

Options:
A.

To prevent external actors from obtaining sensitive data for social engineering attacks

B.

To allow different networks to work together without compromising the confidentiality of data

C.

To ensure only authorized users have the ability to obtain direct access to systems or data

D.

To reduce an attacker's ability to perform low-level or easier attacks against a network

Questions 144

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

Options:
A.

Unidentified removable devices

B.

Default network device credentials

C.

Spear phishing emails

D.

Impersonation of business units through typosquatting

Questions 145

The SOC detected an increase in failed authentication attempts over the weekend. An engineer reviewed the following log output:

SY0-601 Question 145

Which of the following is the most likely attack based on the log information?

Options:
A.

SQL injection

B.

Brute-force

C.

Rootkit

D.

Key logger

E.

Null authentication

Questions 146

A user reports performance issues when accessing certain network fileshares The network team determines endpoint traffic is reaching one of the filestores but is being dropped on the return traffic Which of the following should be corrected to solve this issue?

Options:
A.

Host-based firewall settings

B.

Antivirus software on the host

C.

The intrusion detection system configuration

D.

The /etc/hosts file on the server

Questions 147

Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Select two).

Options:
A.

Tokenization

B.

CI/CD

C.

Honeypots

D.

Threat modeling

E.

DNS sinkhole

F.

Data obfuscation

Questions 148

An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has been given all the developer's documentation about the internal architecture. Which of the following best represents the type of testing that will occur?

Options:
A.

Bug bounty

B.

White-box

C.

Black-box

D.

Gray-box

Questions 149

A security administrator is reviewing reports about suspicious network activity occurring on a subnet Users on the network report that connectivity to various websites is intermittent. The administrator logs in to a workstation and reviews the following command output:

SY0-601 Question 149

Which of the following best describes what is occurring on the network?

Options:
A.

ARP poisoning

B.

On-path attack

C.

URL redirection

D.

IP address conflicts

Questions 150

A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?

Options:
A.

An air gap

B.

A hot site

C.

A VUAN

D.

A screened subnet

Questions 151

An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following:

•Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.

•Internal users in question were changing their passwords frequently during that time period.

•A jump box that several domain administrator users use to connect to remote devices was recently compromised.

•The authentication method used in the environment is NTLM.

Which of the following types of attacks is MOST likely being used to gain unauthorized access?

Options:
A.

Pass-the-hash

B.

Brute-force

C.

Directory traversal

D.

Replay

Questions 152

A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again.

Which of the following is the BEST technical implementation to prevent this from happening again?

Options:
A.

Configure DLP solutions

B.

Disable peer-to-peer sharing

C.

Enable role-based

D.

Mandate job rotation

E.

Implement content filters

Questions 153

During an incident, a company's CIRT determines it is necessary to observe the continued network-based transactions between a callback domain and the malware running on an enterprise PC. Which

of the following techniques would be BEST to enable this activity while reducing the nsk of lateral spread and the risk that the adversary would notice any changes?

Options:
A.

Physically move the PC to a separate Internet point of presence.

B.

Create and apply microsegmentation rules,

C.

Emulate the malware in a heavily monitored DMZ segment

D.

Apply network blacklisting rules for the adversary domain

Questions 154

A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?

Options:
A.

Implementation of preventive controls

B.

Implementation of detective controls

C.

Implementation of deterrent controls

D.

Implementation of corrective controls

Questions 155

Which of the following BEST describes the method a security analyst would use to confirm a file that is downloaded from a trusted security website is not altered in transit or corrupted using a verified checksum?

Options:
A.

Hashing

B.

Salting

C.

Integrity

D.

Digital signature

Questions 156

A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?

Options:
A.

A reverse proxy

B.

A decryption certificate

C.

A spill-tunnel VPN

D.

Load-balanced servers

Questions 157

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the BEST course of action for the analyst to take?

Options:
A.

Apply a DLP solution.

B.

Implement network segmentation

C.

Utilize email content filtering,

D.

isolate the infected attachment.

Questions 158

A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?

Options:
A.

Preventive

B.

Compensating

C.

Corrective

D.

Detective

Questions 159

A company Is planning to install a guest wireless network so visitors will be able to access the Internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the conference rooms where visitors will attend meetings. Which of the following would BEST protect the company's Internal wireless network against visitors accessing company resources?

Options:
A.

Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network

B.

Change the password for the guest wireless network every month.

C.

Decrease the power levels of the access points for the guest wireless network.

D.

Enable WPA2 using 802.1X for logging on to the guest wireless network.

Questions 160

A company recently experienced an attack during which its main website was Directed to the attacker's web server, allowing the attacker to harvest credentials from unsuspecting customers, Which of the following should the

company implement to prevent this type of attack from occurring In the future?

Options:
A.

IPsec

B.

SSL/TLS

C.

ONSSEC

D.

SMIME