ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

A security engineer is hardening existing solutions to reduce application vulnerabilities. Which of the following solutions should the engineer implement FIRST? (Select TWO)

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

An employee received multiple messages on a mobile device. The messages instructing the employee to pair the device to an unknown device. Which of the following BEST describes What a malicious person might be doing to cause this issue to occur?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

Which of the following authentication methods is considered to be the LEAST secure?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

Which of the following incident response steps occurs before containment?

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

Which of the following BEST describes data streams that are compiled through artificial intelligence that provides insight on current cyberintrusions, phishing, and other malicious cyberactivity?

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

Which of the technologies is used to actively monitor for specific file types being transmitted on the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

A Chief Information Security Officer (CISO) is evaluating (he dangers involved in deploying a new ERP system tor the company. The CISO categorizes the system, selects the controls mat apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system Which of the following is the CISO using to evaluate Hie environment for this new ERP system?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions