ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

As part of the lessons-learned phase, the SOC is tasked with building methods to detect if a previous incident is happening again. Which of the following would allow the security analyst to alert the SOC if an event is reoccurring?

Creating a playbook within the SOAR
Creating a playbook within the SOAR
Implementing rules in the NGFW
Implementing rules in the NGFW
Updating the DLP hash database
Updating the DLP hash database
Publishing a new CRL with revoked certificates
Publishing a new CRL with revoked certificates
Suggested answer: A
Explanation:

Creating a playbook within the Security Orchestration, Automation and Response (SOAR) tool would allow the security analyst to detect if an event is reoccurring by triggering automated actions based on the previous incident's characteristics. This can help the SOC to respond quickly and effectively to the incident. Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 7:

Incident Response, pp. 352-354

asked 02/10/2024
Solanki Narendra
36 questions

Question 122

Report Export Collapse

A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device?

Change the default settings on the PC.
Change the default settings on the PC.
Define the PC firewall rules to limit access.
Define the PC firewall rules to limit access.
Encrypt the disk on the storage device.
Encrypt the disk on the storage device.
Plug the storage device in to the UPS
Plug the storage device in to the UPS
Suggested answer: A
Explanation:

The best option that will help to protect the PC from malicious files on the storage device would be

A. Change the default settings on the PC. Changing the default settings on the PC can include disabling the autorun or autoplay feature, which can prevent malicious files from executing automatically when the storage device is plugged in. Changing the default settings can also include enabling antivirus software, updating the operating system and applications, and configuring user account control and permissions.

asked 02/10/2024
Franko Salajcik
39 questions

Question 123

Report Export Collapse

A software company is analyzing a process that detects software vulnerabilities at the earliest stage possible. The goal is to scan the source looking for unsecure practices and weaknesses before the application is deployed in a runtime environment. Which of the following would BEST assist the company with this objective?

Use fuzzing testing
Use fuzzing testing
Use a web vulnerability scanner
Use a web vulnerability scanner
Use static code analysis
Use static code analysis
Use a penetration-testing OS
Use a penetration-testing OS
Suggested answer: C
Explanation:

Using static code analysis would be the best approach to scan the source code looking for unsecure practices and weaknesses before the application is deployed in a runtime environment. This method involves analyzing the source code without actually running the software, which can identify security vulnerabilities that may not be detected by other testing methods. Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 6: Risk Management, pp. 292-295

asked 02/10/2024
Orry Meijer
38 questions

Question 124

Report Export Collapse

Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?

Identify theft
Identify theft
Data loss
Data loss
Data exfiltration
Data exfiltration
Reputation
Reputation
Suggested answer: D
Explanation:

The best option that describes what is impacted the most by the hackers’ attack and threat would be

D. Reputation. Reputation is the perception or opinion that others have about a person or an organization. Reputation can affect the trust, credibility, and success of a person or an organization. In this scenario, if the hackers send the unfavorable pictures to the press, it can damage the reputation of the Chief Executive Officer and the company, and cause negative consequences such as loss of customers, partners, investors, or employees.

asked 02/10/2024
Jordi Nogues
39 questions

Question 125

Report Export Collapse

Which of the following BEST describes the method a security analyst would use to confirm a file that is downloaded from a trusted security website is not altered in transit or corrupted using a verified checksum?

Hashing
Hashing
Salting
Salting
Integrity
Integrity
Digital signature
Digital signature
Suggested answer: A
Explanation:

Hashing is a cryptographic function that produces a unique fixed-size output (i.e., hash value) from an input (i.e., data). The hash value is a digital fingerprint of the data, which means that if the data changes, so too does the hash value. By comparing the hash value of the downloaded file with the hash value provided by the security website, the security analyst can verify that the file has not been altered in transit or corrupted.

asked 02/10/2024
Cyrom Meryll Santos
40 questions

Question 126

Report Export Collapse

Which of the following authentication methods sends out a unique password to be used within a specific number of seconds?

TOTP
TOTP
Biometrics
Biometrics
Kerberos
Kerberos
LDAP
LDAP
Suggested answer: A
Explanation:

Time-based One-Time Password (TOTP) is a type of authentication method that sends out a unique password to be used within a specific number of seconds. It uses a combination of a shared secret key and the current time to generate a one-time password. TOTP is commonly used for two-factor authentication (2FA) to provide an additional layer of security beyond just a username and password.

asked 02/10/2024
K W
31 questions

Question 127

Report Export Collapse

A company recently experienced a major breach. An investigation concludes that customer credit card data was stolen and exfiltrated through a dedicated business partner connection to a vendor, who is not held to the same security contral standards. Which of the following is the MOST likely source of the breach?

Side channel
Side channel
Supply chain
Supply chain
Cryptographic downgrade
Cryptographic downgrade
Malware
Malware
Suggested answer: B
Explanation:

A supply chain attack occurs when a third-party supplier or business partner is compromised, leading to an attacker gaining unauthorized access to the targeted organization's network. In this scenario, the dedicated business partner connection to a vendor was used to exfiltrate customer credit card data, indicating that the vendor's network was breached and used as a supply chain attack vector.

asked 02/10/2024
Juli Santo
40 questions

Question 128

Report Export Collapse

A systems engineer is building a new system for production. Which of the following is the FINAL step to be performed prior to promoting to production?

Disable unneeded services.
Disable unneeded services.
Install the latest security patches.
Install the latest security patches.
Run a vulnerability scan.
Run a vulnerability scan.
Encrypt all disks.
Encrypt all disks.
Suggested answer: C
Explanation:

Running a vulnerability scan is the final step to be performed prior to promoting a system to production. This allows any remaining security issues to be identified and resolved before the system is put into production. Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 3

asked 02/10/2024
Sergio Zozulenko
45 questions

Question 129

Report Export Collapse

An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following:

• Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.

• Internal users in question were changing their passwords frequently during that time period.

• A jump box that several domain administrator users use to connect to remote devices was recently compromised.

• The authentication method used in the environment is NTLM. Which of the following types of attacks is MOST likely being used to gain unauthorized access?

Pass-the-hash
Pass-the-hash
Brute-force
Brute-force
Directory traversal
Directory traversal
Replay
Replay
Suggested answer: A
Explanation:

The suspicious activity reported by the application owner, combined with the recent compromise of the jump box and the use of NTLM authentication, suggests that an attacker is likely using a pass-the- hash attack to gain unauthorized access to the financial application. This type of attack involves stealing hashed passwords from memory and then using them to authenticate as the compromised user without needing to know the user's plaintext password. Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 5

asked 02/10/2024
Joan Campo
40 questions

Question 130

Report Export Collapse

The Chief information Security Officer has directed the security and networking team to retire the use of shared passwords on routers and switches. Which of the following choices BEST meets the requirements?

SAML
SAML
TACACS+
TACACS+
Password vaults
Password vaults
OAuth
OAuth
Suggested answer: B
Explanation:

TACACS+ is a protocol used for remote authentication, authorization, and accounting (AAA) that can be used to replace shared passwords on routers and switches. It provides a more secure method of authentication that allows for centralized management of access control policies. Reference:

CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 6

asked 02/10/2024
Ali Diaz
34 questions
Total 603 questions
Go to page: of 61
Search

Related questions