ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

As part of the lessons-learned phase, the SOC is tasked with building methods to detect if a previous incident is happening again. Which of the following would allow the security analyst to alert the SOC if an event is reoccurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 122

Report Export Collapse

A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device?

Become a Premium Member for full access
  Unlock Premium Member

Question 123

Report Export Collapse

A software company is analyzing a process that detects software vulnerabilities at the earliest stage possible. The goal is to scan the source looking for unsecure practices and weaknesses before the application is deployed in a runtime environment. Which of the following would BEST assist the company with this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 124

Report Export Collapse

Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?

Become a Premium Member for full access
  Unlock Premium Member

Question 125

Report Export Collapse

Which of the following BEST describes the method a security analyst would use to confirm a file that is downloaded from a trusted security website is not altered in transit or corrupted using a verified checksum?

Become a Premium Member for full access
  Unlock Premium Member

Question 126

Report Export Collapse

Which of the following authentication methods sends out a unique password to be used within a specific number of seconds?

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

A company recently experienced a major breach. An investigation concludes that customer credit card data was stolen and exfiltrated through a dedicated business partner connection to a vendor, who is not held to the same security contral standards. Which of the following is the MOST likely source of the breach?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

A systems engineer is building a new system for production. Which of the following is the FINAL step to be performed prior to promoting to production?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following:

• Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.

• Internal users in question were changing their passwords frequently during that time period.

• A jump box that several domain administrator users use to connect to remote devices was recently compromised.

• The authentication method used in the environment is NTLM. Which of the following types of attacks is MOST likely being used to gain unauthorized access?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

The Chief information Security Officer has directed the security and networking team to retire the use of shared passwords on routers and switches. Which of the following choices BEST meets the requirements?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions