ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

A security engineer is hardening existing solutions to reduce application vulnerabilities. Which of the following solutions should the engineer implement FIRST? (Select TWO)

Auto-update
Auto-update
HTTP headers
HTTP headers
Secure cookies
Secure cookies
Third-party updates
Third-party updates
Full disk encryption
Full disk encryption
Sandboxing
Sandboxing
Hardware encryption
Hardware encryption
Suggested answer: A, F
Explanation:

Auto-update can help keep the app up-to-date with the latest security fixes and enhancements, and reduce the risk of exploitation by attackers who target outdated or vulnerable versions of the app. Sandboxing can help isolate the app from other processes and resources on the system, and limit its access and permissions to only what is necessary. Sandboxing can help prevent the app from being affected by or affecting other applications or system components, and contain any potential damage in case of a breach.

asked 02/10/2024
Simone Perego
52 questions

Question 152

Report Export Collapse

A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?

Dictionary
Dictionary
Rainbow table
Rainbow table
Spraying
Spraying
Brute-force
Brute-force
Suggested answer: C
Explanation:

Detailed Password spraying is an attack where an attacker tries a small number of commonly used passwords against a large number of usernames. The goal of password spraying is to avoid detection by avoiding too many failed login attempts for any one user account. The fact that different usernames are being attacked from the same IP address is a strong indication that a password spraying attack is underway.

asked 02/10/2024
Oleksii Derevianchenko
39 questions

Question 153

Report Export Collapse

An employee received multiple messages on a mobile device. The messages instructing the employee to pair the device to an unknown device. Which of the following BEST describes What a malicious person might be doing to cause this issue to occur?

Jamming
Jamming
Bluesnarfing
Bluesnarfing
Evil twin
Evil twin
Rogue access point
Rogue access point
Suggested answer: B
Explanation:

Bluesnarfing is a hacking technique that exploits Bluetooth connections to snatch data from a wireless device. An attacker can perform bluesnarfing when the Bluetooth function is on and your device is discoverable by other devices within range. In some cases, attackers can even make calls from their victim’s phone1.

asked 02/10/2024
Anand R
42 questions

Question 154

Report Export Collapse

A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?

Disable Telnet and force SSH.
Disable Telnet and force SSH.
Establish a continuous ping.
Establish a continuous ping.
Utilize an agentless monitor
Utilize an agentless monitor
Enable SNMPv3 With passwords.
Enable SNMPv3 With passwords.
Suggested answer: C
Explanation:

An agentless monitor is the best method to monitor network operations because it does not require any software or agents to be installed on the devices being monitored, making it less intrusive and less likely to disrupt network operations. This method can monitor various aspects of network operations, such as traffic, performance, and security.

CompTIA Security+ Study Guide, Sixth Edition (SY0-601), Chapter 4: Attacks, Threats, and Vulnerabilities, Monitoring and Detection Techniques, pg. 167-170.

asked 02/10/2024
Zakarya Doqa
26 questions

Question 155

Report Export Collapse

Which of the following authentication methods is considered to be the LEAST secure?

TOTP
TOTP
SMS
SMS
HOTP
HOTP
Token key
Token key
Suggested answer: B
Explanation:

SMS-based authentication is considered to be the least secure among the given options. This is because SMS messages can be intercepted or redirected by attackers through techniques such as SIM swapping, man-in-the-middle attacks, or exploiting weaknesses in the SS7 protocol used by mobile networks. Additionally, SMS messages can be compromised if a user's phone is lost, stolen, or infected with malware. In contrast, TOTP (Time-based One-Time Password), HOTP (HMAC-based One-Time Password), and token keys are more secure as they rely on cryptographic algorithms or physical devices to generate one-time use codes, which are less susceptible to interception or unauthorized access. Reference: 1. National Institute of Standards and Technology (NIST). (2017). Digital Identity Guidelines: Authentication and Lifecycle Management (NIST SP 800-63B). https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf

asked 02/10/2024
Joseph Bauer
43 questions

Question 156

Report Export Collapse

Which of the following incident response steps occurs before containment?

Eradication
Eradication
Recovery
Recovery
Lessons learned
Lessons learned
Identification
Identification
Suggested answer: D
Explanation:

Identification is the first step in the incident response process, which involves recognizing that an incident has occurred. Containment is the second step, followed by eradication, recovery, and lessons learned.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 10: Incident Response and Recovery, pp. 437-441.

asked 02/10/2024
Liusel Herrera Garcia
31 questions

Question 157

Report Export Collapse

Which of the following BEST describes data streams that are compiled through artificial intelligence that provides insight on current cyberintrusions, phishing, and other malicious cyberactivity?

Intelligence fusion
Intelligence fusion
Review reports
Review reports
Log reviews
Log reviews
Threat feeds
Threat feeds
Suggested answer: A
Explanation:

Intelligence fusion is a process that involves aggregating and analyzing data from multiple sources, including artificial intelligence, to provide insight on current cyberintrusions, phishing, and other malicious cyberactivity.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Glossary, p. 767.

asked 02/10/2024
Piyush Zope
43 questions

Question 158

Report Export Collapse

Which of the technologies is used to actively monitor for specific file types being transmitted on the network?

File integrity monitoring
File integrity monitoring
Honeynets
Honeynets
Tcpreplay
Tcpreplay
Data loss prevention
Data loss prevention
Suggested answer: D
Explanation:

Data loss prevention (DLP) is a technology used to actively monitor for specific file types being transmitted on the network. DLP solutions can prevent the unauthorized transfer of sensitive information, such as credit card numbers and social security numbers, by monitoring data in motion.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 2: Technologies and Tools, pp. 99-102.

asked 02/10/2024
Serhan Azdiken
40 questions

Question 159

Report Export Collapse

As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements?

HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
HTTPS:// app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
HTTPS:// app1.comptia.org, Valid from April 10 00:00:00 2021-April 8 12:00:00 2022
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00
HTTPS://.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00
Suggested answer: A
Explanation:

PKI certificates are digital certificates that use public key infrastructure (PKI) to verify the identity and authenticity of a sender and a receiver of data1. PKI certificates can be used to secure web applications with HTTPS, which is a protocol that encrypts and protects the data transmitted over the internet1.

One of the properties of PKI certificates is the domain name, which is the name of the website or web application that the certificate is issued for2. The domain name can be either a specific name, such as app1.comptia.org, or a wildcard name, such as *.comptia.org2. A wildcard name means that the certificate can be used with multiple subdomains of a domain, such as payment.comptia.org or contact.comptia.org2.

Another property of PKI certificates is the validity period, which is the time span during which the certificate is valid and can be used3. The validity period is determined by the certificate authority (CA) that issues the certificate, and it usually ranges from one to three years3. The validity period can be checked by looking at the valid from and valid to dates on the certificate3. Based on these properties, the certificate that will meet the requirements of rotating annually and only containing wildcards at the secondary subdomain level is A. HTTPS://*.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022. This certificate has a wildcard character (*) at the secondary subdomain level, which means it can be used with any subdomain of comptia.org2. It also has a validity period of one year, which means it needs to be rotated annually3.

asked 02/10/2024
Luis Maciel
47 questions

Question 160

Report Export Collapse

A Chief Information Security Officer (CISO) is evaluating (he dangers involved in deploying a new ERP system tor the company. The CISO categorizes the system, selects the controls mat apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system Which of the following is the CISO using to evaluate Hie environment for this new ERP system?

The Diamond Model of Intrusion Analysis
The Diamond Model of Intrusion Analysis
CIS Critical Security Controls
CIS Critical Security Controls
NIST Risk Management Framevtoik
NIST Risk Management Framevtoik
ISO 27002
ISO 27002
Suggested answer: C
Explanation:

The CISO is using the NIST Risk Management Framework (RMF) to evaluate the environment for the new ERP system. The RMF is a structured process for managing risks that involves categorizing the system, selecting controls, implementing controls, assessing controls, and authorizing the system.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 4: Risk Management, pp. 188-191.

asked 02/10/2024
Cristian Melo
40 questions
Total 603 questions
Go to page: of 61
Search

Related questions