ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











A security engineer is hardening existing solutions to reduce application vulnerabilities. Which of the following solutions should the engineer implement FIRST? (Select TWO)

A.
Auto-update
A.
Auto-update
Answers
B.
HTTP headers
B.
HTTP headers
Answers
C.
Secure cookies
C.
Secure cookies
Answers
D.
Third-party updates
D.
Third-party updates
Answers
E.
Full disk encryption
E.
Full disk encryption
Answers
F.
Sandboxing
F.
Sandboxing
Answers
G.
Hardware encryption
G.
Hardware encryption
Answers
Suggested answer: A, F

Explanation:

Auto-update can help keep the app up-to-date with the latest security fixes and enhancements, and reduce the risk of exploitation by attackers who target outdated or vulnerable versions of the app. Sandboxing can help isolate the app from other processes and resources on the system, and limit its access and permissions to only what is necessary. Sandboxing can help prevent the app from being affected by or affecting other applications or system components, and contain any potential damage in case of a breach.

A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?

A.
Dictionary
A.
Dictionary
Answers
B.
Rainbow table
B.
Rainbow table
Answers
C.
Spraying
C.
Spraying
Answers
D.
Brute-force
D.
Brute-force
Answers
Suggested answer: C

Explanation:

Detailed Password spraying is an attack where an attacker tries a small number of commonly used passwords against a large number of usernames. The goal of password spraying is to avoid detection by avoiding too many failed login attempts for any one user account. The fact that different usernames are being attacked from the same IP address is a strong indication that a password spraying attack is underway.

An employee received multiple messages on a mobile device. The messages instructing the employee to pair the device to an unknown device. Which of the following BEST describes What a malicious person might be doing to cause this issue to occur?

A.
Jamming
A.
Jamming
Answers
B.
Bluesnarfing
B.
Bluesnarfing
Answers
C.
Evil twin
C.
Evil twin
Answers
D.
Rogue access point
D.
Rogue access point
Answers
Suggested answer: B

Explanation:

Bluesnarfing is a hacking technique that exploits Bluetooth connections to snatch data from a wireless device. An attacker can perform bluesnarfing when the Bluetooth function is on and your device is discoverable by other devices within range. In some cases, attackers can even make calls from their victim’s phone1.

A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?

A.
Disable Telnet and force SSH.
A.
Disable Telnet and force SSH.
Answers
B.
Establish a continuous ping.
B.
Establish a continuous ping.
Answers
C.
Utilize an agentless monitor
C.
Utilize an agentless monitor
Answers
D.
Enable SNMPv3 With passwords.
D.
Enable SNMPv3 With passwords.
Answers
Suggested answer: C

Explanation:

An agentless monitor is the best method to monitor network operations because it does not require any software or agents to be installed on the devices being monitored, making it less intrusive and less likely to disrupt network operations. This method can monitor various aspects of network operations, such as traffic, performance, and security.

CompTIA Security+ Study Guide, Sixth Edition (SY0-601), Chapter 4: Attacks, Threats, and Vulnerabilities, Monitoring and Detection Techniques, pg. 167-170.

Which of the following authentication methods is considered to be the LEAST secure?

A.
TOTP
A.
TOTP
Answers
B.
SMS
B.
SMS
Answers
C.
HOTP
C.
HOTP
Answers
D.
Token key
D.
Token key
Answers
Suggested answer: B

Explanation:

SMS-based authentication is considered to be the least secure among the given options. This is because SMS messages can be intercepted or redirected by attackers through techniques such as SIM swapping, man-in-the-middle attacks, or exploiting weaknesses in the SS7 protocol used by mobile networks. Additionally, SMS messages can be compromised if a user's phone is lost, stolen, or infected with malware. In contrast, TOTP (Time-based One-Time Password), HOTP (HMAC-based One-Time Password), and token keys are more secure as they rely on cryptographic algorithms or physical devices to generate one-time use codes, which are less susceptible to interception or unauthorized access. Reference: 1. National Institute of Standards and Technology (NIST). (2017). Digital Identity Guidelines: Authentication and Lifecycle Management (NIST SP 800-63B). https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf

Which of the following incident response steps occurs before containment?

A.
Eradication
A.
Eradication
Answers
B.
Recovery
B.
Recovery
Answers
C.
Lessons learned
C.
Lessons learned
Answers
D.
Identification
D.
Identification
Answers
Suggested answer: D

Explanation:

Identification is the first step in the incident response process, which involves recognizing that an incident has occurred. Containment is the second step, followed by eradication, recovery, and lessons learned.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 10: Incident Response and Recovery, pp. 437-441.

Which of the following BEST describes data streams that are compiled through artificial intelligence that provides insight on current cyberintrusions, phishing, and other malicious cyberactivity?

A.
Intelligence fusion
A.
Intelligence fusion
Answers
B.
Review reports
B.
Review reports
Answers
C.
Log reviews
C.
Log reviews
Answers
D.
Threat feeds
D.
Threat feeds
Answers
Suggested answer: A

Explanation:

Intelligence fusion is a process that involves aggregating and analyzing data from multiple sources, including artificial intelligence, to provide insight on current cyberintrusions, phishing, and other malicious cyberactivity.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Glossary, p. 767.

Which of the technologies is used to actively monitor for specific file types being transmitted on the network?

A.
File integrity monitoring
A.
File integrity monitoring
Answers
B.
Honeynets
B.
Honeynets
Answers
C.
Tcpreplay
C.
Tcpreplay
Answers
D.
Data loss prevention
D.
Data loss prevention
Answers
Suggested answer: D

Explanation:

Data loss prevention (DLP) is a technology used to actively monitor for specific file types being transmitted on the network. DLP solutions can prevent the unauthorized transfer of sensitive information, such as credit card numbers and social security numbers, by monitoring data in motion.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 2: Technologies and Tools, pp. 99-102.

As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements?

A.
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
A.
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
Answers
B.
HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
B.
HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
Answers
C.
HTTPS:// app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
C.
HTTPS:// app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
Answers
D.
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00
D.
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00
Answers
Suggested answer: A

Explanation:

PKI certificates are digital certificates that use public key infrastructure (PKI) to verify the identity and authenticity of a sender and a receiver of data1. PKI certificates can be used to secure web applications with HTTPS, which is a protocol that encrypts and protects the data transmitted over the internet1.

One of the properties of PKI certificates is the domain name, which is the name of the website or web application that the certificate is issued for2. The domain name can be either a specific name, such as app1.comptia.org, or a wildcard name, such as *.comptia.org2. A wildcard name means that the certificate can be used with multiple subdomains of a domain, such as payment.comptia.org or contact.comptia.org2.

Another property of PKI certificates is the validity period, which is the time span during which the certificate is valid and can be used3. The validity period is determined by the certificate authority (CA) that issues the certificate, and it usually ranges from one to three years3. The validity period can be checked by looking at the valid from and valid to dates on the certificate3. Based on these properties, the certificate that will meet the requirements of rotating annually and only containing wildcards at the secondary subdomain level is A. HTTPS://*.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022. This certificate has a wildcard character (*) at the secondary subdomain level, which means it can be used with any subdomain of comptia.org2. It also has a validity period of one year, which means it needs to be rotated annually3.

A Chief Information Security Officer (CISO) is evaluating (he dangers involved in deploying a new ERP system tor the company. The CISO categorizes the system, selects the controls mat apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system Which of the following is the CISO using to evaluate Hie environment for this new ERP system?

A.
The Diamond Model of Intrusion Analysis
A.
The Diamond Model of Intrusion Analysis
Answers
B.
CIS Critical Security Controls
B.
CIS Critical Security Controls
Answers
C.
NIST Risk Management Framevtoik
C.
NIST Risk Management Framevtoik
Answers
D.
ISO 27002
D.
ISO 27002
Answers
Suggested answer: C

Explanation:

The CISO is using the NIST Risk Management Framework (RMF) to evaluate the environment for the new ERP system. The RMF is a structured process for managing risks that involves categorizing the system, selecting controls, implementing controls, assessing controls, and authorizing the system.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 4: Risk Management, pp. 188-191.

Total 603 questions
Go to page: of 61