ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report Export Collapse

A customer has reported that an organization's website displayed an image of a smiley (ace rather than the expected web page for a short time two days earlier. A security analyst reviews log tries and sees the following around the lime of the incident:

CompTIA SY0-601 image Question 92 98182 10022024175359000000

Which of the following is MOST likely occurring?

Invalid trust chain
Invalid trust chain
Domain hijacking
Domain hijacking
DNS poisoning
DNS poisoning
URL redirection
URL redirection
Suggested answer: C
Explanation:

The log entry shows the IP address for "www.example.com" being changed to a different IP address, which is likely the result of DNS poisoning. DNS poisoning occurs when an attacker is able to change the IP address associated with a domain name in a DNS server's cache, causing clients to connect to the attacker's server instead of the legitimate server. Reference: CompTIA Security+ SY0-601 Exam Objectives: 3.2 Given a scenario, implement secure network architecture concepts.

asked 02/10/2024
Mohamed Iftiquar Aslam Hameed
41 questions

Question 102

Report Export Collapse

Which of the following would produce the closet experience of responding to an actual incident response scenario?

Lessons learned
Lessons learned
Simulation
Simulation
Walk-through
Walk-through
Tabletop
Tabletop
Suggested answer: B
Explanation:

A simulation exercise is designed to create an experience that is as close as possible to a real-world incident response scenario. It involves simulating an attack or other security incident and then having security personnel respond to the situation as they would in a real incident. Reference: CompTIA Security+ SY0-601 Exam Objectives: 1.1 Explain the importance of implementing security concepts, methodologies, and practices.

asked 02/10/2024
irwandi irwandi
36 questions

Question 103

Report Export Collapse

A security analyst was deploying a new website and found a connection attempting to authenticate on the site's portal. While Investigating The incident, the analyst identified the following Input in the username field:

CompTIA SY0-601 image Question 94 98184 10022024175359000000

Which of the following BEST explains this type of attack?

DLL injection to hijack administrator services
DLL injection to hijack administrator services
SQLi on the field to bypass authentication
SQLi on the field to bypass authentication
Execution of a stored XSS on the website
Execution of a stored XSS on the website
Code to execute a race condition on the server
Code to execute a race condition on the server
Suggested answer: B
Explanation:

The input "admin' or 1=1--" in the username field is an example of SQL injection (SQLi) attack. In this case, the attacker is attempting to bypass authentication by injecting SQL code into the username field that will cause the authentication check to always return true. Reference: CompTIA Security+ SY0-601 Exam Objectives: 3.1 Given a scenario, use appropriate software tools to assess the security posture of an organization.

asked 02/10/2024
rafael Flores
56 questions

Question 104

Report Export Collapse

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access Which of the following is the BEST security solution to reduce this risk?

CASB
CASB
VPN concentrator
VPN concentrator
MFA
MFA
VPC endpoint
VPC endpoint
Suggested answer: A
Explanation:

A Cloud Access Security Broker (CASB) can be used to monitor and control access to cloud-based applications, including unsanctioned SaaS applications. It can help enforce policies that prevent access to high-risk SaaS applications and provide visibility into the use of such applications by employees. Reference: CompTIA Security+ SY0-601 Exam Objectives: 3.3 Given a scenario, implement secure mobile solutions.

asked 02/10/2024
Lawrence Acherman
48 questions

Question 105

Report Export Collapse

After a WiFi scan of a local office was conducted, an unknown wireless signal was identified Upon investigation, an unknown Raspberry Pi device was found connected to an Ethernet port using a single connection. Which of the following BEST describes the purpose of this device?

loT sensor
loT sensor
Evil twin
Evil twin
Rogue access point
Rogue access point
On-path attack
On-path attack
Suggested answer: C
Explanation:

A Raspberry Pi device connected to an Ethernet port could be configured as a rogue access point, allowing an attacker to intercept and analyze network traffic or perform other malicious activities.

Reference: CompTIA Security+ SY0-601 Exam Objectives: 3.2 Given a scenario, implement secure network architecture concepts.

asked 02/10/2024
Michele Punzo
42 questions

Question 106

Report Export Collapse

Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public Which of the following security solutions would mitigate the risk of future data disclosures?

FDE
FDE
TPM
TPM
HIDS
HIDS
VPN
VPN
Suggested answer: A
Explanation:

Based on these definitions, the best security solution to mitigate the risk of future data disclosures from a laptop would be FDE123. FDE would prevent unauthorized access to the data stored on the laptop even if it is stolen or lost. FDE can also use TPM to store the encryption key and ensure that only trusted software can decrypt the data3. HIDS and VPN are not directly related to data encryption, but they can provide additional security benefits by detecting intrusions and protecting network traffic respectively.

asked 02/10/2024
B schatens
47 questions

Question 107

Report Export Collapse

A security researcher has alerted an organization that its sensitive user data was found for sale on a website. Which of the following should the organization use to inform the affected parties?

An incident response plan
An incident response plan
A communications plan
A communications plan
A business continuity plan
A business continuity plan
A disaster recovery plan
A disaster recovery plan
Suggested answer: B
Explanation:

A communications plan should be used to inform the affected parties about the sale of sensitive user data on a website. The communications plan should detail how the organization will handle media inquiries, how to communicate with customers, and how to respond to other interested parties.

asked 02/10/2024
Andrew Dobie
39 questions

Question 108

Report Export Collapse

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained. Which of the following roles would MOST likely include these responsibilities?

Data protection officer
Data protection officer
Data owner
Data owner
Backup administrator
Backup administrator
Data custodian
Data custodian
Internal auditor
Internal auditor
Suggested answer: D
Explanation:

The responsibilities of ensuring backups are properly maintained and implementing technical controls to protect data are the responsibilities of the data custodian role. Reference: CompTIA Security+ Study Guide by Emmett Dulaney, Chapter 7: Securing Hosts and Data, Data Custodian

asked 02/10/2024
S Muchobor
42 questions

Question 109

Report Export Collapse

Which of the following would MOST likely be identified by a credentialed scan but would be missed by an uncredentialed scan?

Vulnerabilities with a CVSS score greater than 6.9.
Vulnerabilities with a CVSS score greater than 6.9.
Critical infrastructure vulnerabilities on non-IP protocols.
Critical infrastructure vulnerabilities on non-IP protocols.
CVEs related to non-Microsoft systems such as printers and switches.
CVEs related to non-Microsoft systems such as printers and switches.
Missing patches for third-party software on Windows workstations and servers.
Missing patches for third-party software on Windows workstations and servers.
Suggested answer: D
Explanation:

An uncredentialed scan would miss missing patches for third-party software on Windows workstations and servers. A credentialed scan, however, can scan the registry and file system to determine the patch level of third-party applications. Reference: CompTIA Security+ Study Guide by Emmett Dulaney, Chapter 4: Identity and Access Management, The Importance of Credentialing Scans

asked 02/10/2024
Jonno Sweeney
48 questions

Question 110

Report Export Collapse

Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

Unsecure protocols
Unsecure protocols
Use of penetration-testing utilities
Use of penetration-testing utilities
Weak passwords
Weak passwords
Included third-party libraries
Included third-party libraries
Vendors/supply chain
Vendors/supply chain
Outdated anti-malware software
Outdated anti-malware software
Suggested answer: D, E
Explanation:

The most likely vectors for the unauthorized inclusion of vulnerable code in a software company's final software releases are included third-party libraries and vendors/supply chain. Reference:

CompTIA Security+ Study Guide by Emmett Dulaney, Chapter 8: Application, Data, and Host Security, Supply Chain and Software Development Life Cycle

asked 02/10/2024
Carlos Castro
35 questions
Total 603 questions
Go to page: of 61
Search

Related questions