CompTIA SY0-601 Practice Test - Questions Answers, Page 16

List of questions
Question 151

A security engineer is hardening existing solutions to reduce application vulnerabilities. Which of the following solutions should the engineer implement FIRST? (Select TWO)
Question 152

A security analyst reviews a companyβs authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?
Question 153

An employee received multiple messages on a mobile device. The messages instructing the employee to pair the device to an unknown device. Which of the following BEST describes What a malicious person might be doing to cause this issue to occur?
Question 154

A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?
Question 155

Which of the following authentication methods is considered to be the LEAST secure?
Question 156

Which of the following incident response steps occurs before containment?
Question 157

Which of the following BEST describes data streams that are compiled through artificial intelligence that provides insight on current cyberintrusions, phishing, and other malicious cyberactivity?
Question 158

Which of the technologies is used to actively monitor for specific file types being transmitted on the network?
Question 159

As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements?
Question 160

A Chief Information Security Officer (CISO) is evaluating (he dangers involved in deploying a new ERP system tor the company. The CISO categorizes the system, selects the controls mat apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system Which of the following is the CISO using to evaluate Hie environment for this new ERP system?
Question