ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device is away from a home office. Which of the following should the CISO choose?

A.
CASB
A.
CASB
Answers
B.
Next-generation SWG
B.
Next-generation SWG
Answers
C.
NGFW
C.
NGFW
Answers
D.
Web-application firewall
D.
Web-application firewall
Answers
Suggested answer: B

Explanation:

The solution that the CISO should choose is Next-generation Secure Web Gateway (SWG), which provides URL filtering and categorization to prevent users from accessing malicious sites, even when they are away from the office. NGFWs are typically cloud-based and offer multiple security layers, including malware detection, intrusion prevention, and data loss prevention. Reference:

https://www.paloaltonetworks.com/cyberpedia/what-is-a-next-generation-secure-web-gateway-ng- swg

CompTIA Security+ Study Guide Exam SY0-601, Chapter 4

A store receives reports that shoppers’ credit card information is being stolen. Upon further analysis, those same shoppers also withdrew money from an ATM in that store. The attackers are using the targeted shoppers’ credit card information to make online purchases. Which of the following attacks is the MOST probable cause?

A.
Identity theft
A.
Identity theft
Answers
B.
RFID cloning
B.
RFID cloning
Answers
C.
Shoulder surfing
C.
Shoulder surfing
Answers
D.
Card skimming
D.
Card skimming
Answers
Suggested answer: D

Explanation:

The attackers are using card skimming to steal shoppers' credit card information, which they use to make online purchases. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 5

Which of the following controls would be the MOST cost-effective and time-efficient to deter intrusions at the perimeter of a restricted, remote military training area? (Select TWO).

A.
Barricades
A.
Barricades
Answers
B.
Thermal sensors
B.
Thermal sensors
Answers
C.
Drones
C.
Drones
Answers
D.
Signage
D.
Signage
Answers
E.
Motion sensors
E.
Motion sensors
Answers
F.
Guards
F.
Guards
Answers
G.
Bollards
G.
Bollards
Answers
Suggested answer: A, D

Explanation:

Barricades and signage are the most cost-effective and time-efficient controls to deter intrusions at the perimeter of a restricted, remote military training area. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 7

During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?

A.
1s
A.
1s
Answers
B.
chflags
B.
chflags
Answers
C.
chmod
C.
chmod
Answers
D.
lsof
D.
lsof
Answers
E.
setuid
E.
setuid
Answers
Suggested answer: C

Explanation:

The chmod command is used to change the permissions of a file or directory. The analyst can use chmod to reduce the permissions for existing users and groups and remove the set-user-ID bit from the file. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 6

A Chief Information Officer is concerned about employees using company-issued laptops lo steal data when accessing network shares. Which of the following should the company Implement?

A.
DLP
A.
DLP
Answers
B.
CASB
B.
CASB
Answers
C.
HIDS
C.
HIDS
Answers
D.
EDR
D.
EDR
Answers
E.
UEFI
E.
UEFI
Answers
Suggested answer: A

Explanation:

The company should implement Data Loss Prevention (DLP) to prevent employees from stealing data when accessing network shares. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 8

An organization is moving away from the use of client-side and server-side certificates for EAR The company would like for the new EAP solution to have the ability to detect rogue access points. Which of the following would accomplish these requirements?

A.
PEAP
A.
PEAP
Answers
B.
EAP-FAST
B.
EAP-FAST
Answers
C.
EAP-TLS
C.
EAP-TLS
Answers
D.
EAP-TTLS
D.
EAP-TTLS
Answers
Suggested answer: B

Explanation:

EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling) supports mutual authentication and is designed to simplify the deployment of strong, password-based authentication. EAP-FAST includes a mechanism for detecting rogue access points. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 4

Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following:

• All users share workstations throughout the day.

• Endpoint protection was disabled on several workstations throughout the network.

• Travel times on logins from the affected users are impossible.

• Sensitive data is being uploaded to external sites.

• All user account passwords were forced to be reset and the issue continued.

Which of the following attacks is being used to compromise the user accounts?

A.
Brute-force
A.
Brute-force
Answers
B.
Keylogger
B.
Keylogger
Answers
C.
Dictionary
C.
Dictionary
Answers
D.
Rainbow
D.
Rainbow
Answers
Suggested answer: B

Explanation:

The symptoms suggest a keylogger is being used to compromise the user accounts, allowing the attackers to obtain the users' passwords and other sensitive information. Reference:

CompTIA Security+ Study Guide Exam SY0-601, Chapter 6

Per company security policy, IT staff members are required to have separate credentials to perform administrative functions using just-in-time permissions. Which of the following solutions is the company Implementing?

A.
Privileged access management
A.
Privileged access management
Answers
B.
SSO
B.
SSO
Answers
C.
RADIUS
C.
RADIUS
Answers
D.
Attribute-based access control
D.
Attribute-based access control
Answers
Suggested answer: A

Explanation:

The company is implementing privileged access management, which provides just-in-time permissions for administrative functions.

A company Is planning to install a guest wireless network so visitors will be able to access the Internet. The stakeholders want the network to be easy to connect to so time is not wasted during meetings. The WAPs are configured so that power levels and antennas cover only the conference rooms where visitors will attend meetings.

Which of the following would BEST protect the company's Internal wireless network against visitors accessing company resources?

A.
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network
A.
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network
Answers
B.
Change the password for the guest wireless network every month.
B.
Change the password for the guest wireless network every month.
Answers
C.
Decrease the power levels of the access points for the guest wireless network.
C.
Decrease the power levels of the access points for the guest wireless network.
Answers
D.
Enable WPA2 using 802.1X for logging on to the guest wireless network.
D.
Enable WPA2 using 802.1X for logging on to the guest wireless network.
Answers
Suggested answer: A

Explanation:

Configuring the guest wireless network on a separate VLAN from the company's internal wireless network will prevent visitors from accessing company resources. Reference: CompTIA Security+ Study Guide: Exam SY0-601, Chapter 4

A Chief Information Officer is concerned about employees using company-issued laptops to steal data when accessing network shares. Which of the following should the company implement?

A.
DLP
A.
DLP
Answers
B.
CASB
B.
CASB
Answers
C.
HIDS
C.
HIDS
Answers
D.
EDR
D.
EDR
Answers
E.
UEFI
E.
UEFI
Answers
Suggested answer: A

Explanation:

The company should implement Data Loss Prevention (DLP) to prevent employees from stealing data. Reference: CompTIA Security+ Study Guide: Exam SY0-601, Chapter 8

Total 603 questions
Go to page: of 61