ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 14

Add to Whishlist

List of questions

Question 131

Report Export Collapse

The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device is away from a home office. Which of the following should the CISO choose?

Become a Premium Member for full access
  Unlock Premium Member

Question 132

Report Export Collapse

A store receives reports that shoppers’ credit card information is being stolen. Upon further analysis, those same shoppers also withdrew money from an ATM in that store. The attackers are using the targeted shoppers’ credit card information to make online purchases. Which of the following attacks is the MOST probable cause?

Become a Premium Member for full access
  Unlock Premium Member

Question 133

Report Export Collapse

Which of the following controls would be the MOST cost-effective and time-efficient to deter intrusions at the perimeter of a restricted, remote military training area? (Select TWO).

Become a Premium Member for full access
  Unlock Premium Member

Question 134

Report Export Collapse

During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?

Become a Premium Member for full access
  Unlock Premium Member

Question 135

Report Export Collapse

A Chief Information Officer is concerned about employees using company-issued laptops lo steal data when accessing network shares. Which of the following should the company Implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 136

Report Export Collapse

An organization is moving away from the use of client-side and server-side certificates for EAR The company would like for the new EAP solution to have the ability to detect rogue access points. Which of the following would accomplish these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 137

Report Export Collapse

Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following:

β€’ All users share workstations throughout the day.

β€’ Endpoint protection was disabled on several workstations throughout the network.

β€’ Travel times on logins from the affected users are impossible.

β€’ Sensitive data is being uploaded to external sites.

β€’ All user account passwords were forced to be reset and the issue continued.

Which of the following attacks is being used to compromise the user accounts?

Become a Premium Member for full access
  Unlock Premium Member

Question 138

Report Export Collapse

Per company security policy, IT staff members are required to have separate credentials to perform administrative functions using just-in-time permissions. Which of the following solutions is the company Implementing?

Become a Premium Member for full access
  Unlock Premium Member

Question 139

Report Export Collapse

A company Is planning to install a guest wireless network so visitors will be able to access the Internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the conference rooms where visitors will attend meetings.

Which of the following would BEST protect the company's Internal wireless network against visitors accessing company resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 140

Report Export Collapse

A Chief Information Officer is concerned about employees using company-issued laptops to steal data when accessing network shares. Which of the following should the company implement?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions