ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

A data owner has been tasked with assigning proper data classifications and destruction methods for various types of data contained within the environment.


Question 1
Correct answer: Question 1

Explanation:

DRAG DROP

A security engineer is setting up passwordless authentication for the first time.

INSTRUCTIONS

Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question 2
Correct answer: Question 2

DRAG DROP

Leveraging the information supplied below, complete the CSR for the server to set up TLS (HTTPS)

• Hostname: ws01

• Domain: comptia.org

• IPv4: 10.1.9.50

• IPV4: 10.2.10.50

• Root: home.aspx

• DNS CNAME:homesite.

Instructions:

Drag the various data points to the correct locations within the CSR. Extension criteria belong in the let hand column and values belong in the corresponding row in the right hand column.



Question 3
Correct answer: Question 3

DRAG DROP

An attack has occurred against a company.

INSTRUCTIONS

You have been tasked to do the following:

Identify the type of attack that is occurring on the network by clicking on the attacker’s tablet and reviewing the output. (Answer Area 1)

Identify which compensating controls should be implemented on the assets, in order to reduce the effectiveness of future attacks by dragging them to the correct server. (Answer area 2)

All objects will be used, but not all placeholders may be filled. Objects may only be used once.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Question 4
Correct answer: Question 4

HOTSPOT

You received the output of a recent vulnerability assessment.

Review the assessment and scan output and determine the appropriate remedialion(s} 'or «ach dewce.

Remediation options may be selected multiple times, and some devices may require more than one remediation.

If at any time you would like to biing bade the initial state ot the simulation, please dick me Reset All button.


Question 5
Correct answer: Question 5

HOTSPOT


Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.


INSTRUCTIONS


Not all attacks and remediation actions will be used.


If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


Question 6
Correct answer: Question 6

HOTSPOT

An incident has occurred in the production environment.

Analyze the command outputs and identify the type of compromise.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.



A.
A.
Answers
Suggested answer: A

Explanation:

Explanation:

Answer1: Logic Bomb

Answer2: RAT


HOTSPOT


The security administrator has installed a new firewall which implements an implicit DENY policy by default.


INSTRUCTIONS


Click on the firewall and configure it to allow ONLY the following communication:

The Accounting workstation can ONLY access the web server on the public network over the default HTTPS port. The accounting workstation should not access other networks.s

The HR workstation should be restricted to communicate with the Financial server ONLY, over the default SCP port.

The Admin workstation should ONLY be able to access the servers on the secure network over the default TFTP port.


The firewall will process rules in a top-down manner in order as a first match. The port number must be typed in and only one port number can be entered per rule. Type ANY for all ports.


If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.



Question 8
Correct answer: Question 8

HOTSPOT

You are security administrator investigating a potential infection on a network.

Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.



Question 9
Correct answer: Question 9

Explanation:

Based on the logs, it seems that the host that originated the infection is 192.168.10.22. This host has a suspicious process named svchost.exe running on port 443, which is unusual for a Windows service.It also has a large number of outbound connections to different IP addresses on port 443, indicating that it is part of a botnet.The firewall log shows that this host has been communicating with 10.10.9.18, which is another infected host on the engineering network. This host also has a suspicious process named svchost.exe running on port 443, and a large number of outbound connections to different IP addresses on port 443.The other hosts on the R&D network (192.168.10.37 and 192.168.10.41) are clean, as they do not have any suspicious processes or connections.


A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which f the following configuration should an analysis enable To improve security? (Select TWO.)

A.
RADIUS
A.
RADIUS
Answers
B.
PEAP
B.
PEAP
Answers
C.
WPS
C.
WPS
Answers
D.
WEP-EKIP
D.
WEP-EKIP
Answers
E.
SSL
E.
SSL
Answers
F.
WPA2-PSK
F.
WPA2-PSK
Answers
Suggested answer: A, F

Explanation:

To improve the security of the WiFi network and prevent unauthorized devices from accessing the network, the configuration options of RADIUS and WPA2-PSK should be enabled. RADIUS (Remote Authentication Dial-In User Service) is an authentication protocol that can be used to control access to the WiFi network. It can provide stronger authentication and authorization than WEP and WPA. WPA2-PSK (WiFi Protected Access 2 with Pre-Shared Key) is a security protocol that uses stronger encryption than WEP and WPA. It requires a pre-shared key (PSK) to be entered on each device that wants to access the network. This helps prevent unauthorized devices from accessing the network.

Total 603 questions
Go to page: of 61