ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 14

List of questions

Question 131

Report Export Collapse

The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device is away from a home office. Which of the following should the CISO choose?

CASB
CASB
Next-generation SWG
Next-generation SWG
NGFW
NGFW
Web-application firewall
Web-application firewall
Suggested answer: B
Explanation:

The solution that the CISO should choose is Next-generation Secure Web Gateway (SWG), which provides URL filtering and categorization to prevent users from accessing malicious sites, even when they are away from the office. NGFWs are typically cloud-based and offer multiple security layers, including malware detection, intrusion prevention, and data loss prevention. Reference:

https://www.paloaltonetworks.com/cyberpedia/what-is-a-next-generation-secure-web-gateway-ng- swg

CompTIA Security+ Study Guide Exam SY0-601, Chapter 4

asked 02/10/2024
Melvin Masina
38 questions

Question 132

Report Export Collapse

A store receives reports that shoppers’ credit card information is being stolen. Upon further analysis, those same shoppers also withdrew money from an ATM in that store. The attackers are using the targeted shoppers’ credit card information to make online purchases. Which of the following attacks is the MOST probable cause?

Identity theft
Identity theft
RFID cloning
RFID cloning
Shoulder surfing
Shoulder surfing
Card skimming
Card skimming
Suggested answer: D
Explanation:

The attackers are using card skimming to steal shoppers' credit card information, which they use to make online purchases. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 5

asked 02/10/2024
Daniel Bucknor-Ankrah
43 questions

Question 133

Report Export Collapse

Which of the following controls would be the MOST cost-effective and time-efficient to deter intrusions at the perimeter of a restricted, remote military training area? (Select TWO).

Barricades
Barricades
Thermal sensors
Thermal sensors
Drones
Drones
Signage
Signage
Motion sensors
Motion sensors
Guards
Guards
Bollards
Bollards
Suggested answer: A, D
Explanation:

Barricades and signage are the most cost-effective and time-efficient controls to deter intrusions at the perimeter of a restricted, remote military training area. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 7

asked 02/10/2024
ML MASANE
50 questions

Question 134

Report Export Collapse

During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?

1s
1s
chflags
chflags
chmod
chmod
lsof
lsof
setuid
setuid
Suggested answer: C
Explanation:

The chmod command is used to change the permissions of a file or directory. The analyst can use chmod to reduce the permissions for existing users and groups and remove the set-user-ID bit from the file. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 6

asked 02/10/2024
Olaf Messerschmidt
35 questions

Question 135

Report Export Collapse

A Chief Information Officer is concerned about employees using company-issued laptops lo steal data when accessing network shares. Which of the following should the company Implement?

DLP
DLP
CASB
CASB
HIDS
HIDS
EDR
EDR
UEFI
UEFI
Suggested answer: A
Explanation:

The company should implement Data Loss Prevention (DLP) to prevent employees from stealing data when accessing network shares. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 8

asked 02/10/2024
Victor Cantu
40 questions

Question 136

Report Export Collapse

An organization is moving away from the use of client-side and server-side certificates for EAR The company would like for the new EAP solution to have the ability to detect rogue access points. Which of the following would accomplish these requirements?

PEAP
PEAP
EAP-FAST
EAP-FAST
EAP-TLS
EAP-TLS
EAP-TTLS
EAP-TTLS
Suggested answer: B
Explanation:

EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling) supports mutual authentication and is designed to simplify the deployment of strong, password-based authentication. EAP-FAST includes a mechanism for detecting rogue access points. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 4

asked 02/10/2024
Zakarya Doqa
26 questions

Question 137

Report Export Collapse

Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following:

• All users share workstations throughout the day.

• Endpoint protection was disabled on several workstations throughout the network.

• Travel times on logins from the affected users are impossible.

• Sensitive data is being uploaded to external sites.

• All user account passwords were forced to be reset and the issue continued.

Which of the following attacks is being used to compromise the user accounts?

Brute-force
Brute-force
Keylogger
Keylogger
Dictionary
Dictionary
Rainbow
Rainbow
Suggested answer: B
Explanation:

The symptoms suggest a keylogger is being used to compromise the user accounts, allowing the attackers to obtain the users' passwords and other sensitive information. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 6

asked 02/10/2024
Thijs van Ham
39 questions

Question 138

Report Export Collapse

Per company security policy, IT staff members are required to have separate credentials to perform administrative functions using just-in-time permissions. Which of the following solutions is the company Implementing?

Privileged access management
Privileged access management
SSO
SSO
RADIUS
RADIUS
Attribute-based access control
Attribute-based access control
Suggested answer: A
Explanation:

The company is implementing privileged access management, which provides just-in-time permissions for administrative functions.

asked 02/10/2024
Gennaro Migliaccio
34 questions

Question 139

Report Export Collapse

A company Is planning to install a guest wireless network so visitors will be able to access the Internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the conference rooms where visitors will attend meetings.

Which of the following would BEST protect the company's Internal wireless network against visitors accessing company resources?

Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network
Change the password for the guest wireless network every month.
Change the password for the guest wireless network every month.
Decrease the power levels of the access points for the guest wireless network.
Decrease the power levels of the access points for the guest wireless network.
Enable WPA2 using 802.1X for logging on to the guest wireless network.
Enable WPA2 using 802.1X for logging on to the guest wireless network.
Suggested answer: A
Explanation:

Configuring the guest wireless network on a separate VLAN from the company's internal wireless network will prevent visitors from accessing company resources. Reference: CompTIA Security+ Study Guide: Exam SY0-601, Chapter 4

asked 02/10/2024
Enrique Villegas
41 questions

Question 140

Report Export Collapse

A Chief Information Officer is concerned about employees using company-issued laptops to steal data when accessing network shares. Which of the following should the company implement?

DLP
DLP
CASB
CASB
HIDS
HIDS
EDR
EDR
UEFI
UEFI
Suggested answer: A
Explanation:

The company should implement Data Loss Prevention (DLP) to prevent employees from stealing data. Reference: CompTIA Security+ Study Guide: Exam SY0-601, Chapter 8

asked 02/10/2024
EVA LITA
44 questions
Total 603 questions
Go to page: of 61
Search

Related questions