ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











A security administrator wants to implement a program that tests a user's ability to recognize attacks over the organization's email system Which of the following would be BEST suited for this task?

A.
Social media analysis
A.
Social media analysis
Answers
B.
Annual information security training
B.
Annual information security training
Answers
C.
Gamification
C.
Gamification
Answers
D.
Phishing campaign
D.
Phishing campaign
Answers
Suggested answer: D

Explanation:

A phishing campaign is a simulated attack that tests a user's ability to recognize attacks over the organization's email system. Phishing campaigns can be used to train users on how to identify and report suspicious emails.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 2: Technologies and Tools, pp. 85-86.

A third party asked a user to share a public key for secure communication. Which of the following file formats should the user choose to share the key?

A.
.pfx
A.
.pfx
Answers
B.
.csr
B.
.csr
Answers
C.
.pvk
C.
.pvk
Answers
D.
.cer
D.
.cer
Answers
Suggested answer: D

Explanation:

A user should choose the .cer file format to share a public key for secure communication. A .cer file is a public key certificate that can be shared with third parties to enable secure communication.

Reference: CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 6: Cryptography, pp. 301-302.

A public key is a cryptographic key that can be used to encrypt or verify data. A public key file is a file that contains one or more public keys in a specific format.

There are different formats for public key files, depending on the application and the algorithm used. Some of the common formats are:

.pfx: This is a file format that stores a certificate and its private and public keys. It is also known as PKCS#12 or Personal Information Exchange. It is used by some applications such as Microsoft Internet Explorer and Outlook to import and export certificates and keys.1 .csr: This is a file format that stores a Certificate Signing Request, which is a message sent to a Certificate Authority (CA) to request a digital certificate. It contains the public key and some information about the identity of the requester. It is also known as PKCS#10 or Certification Request Syntax.2

.pvk: This is a file format that stores a private key for Microsoft Authenticode code signing. It is used with a .spc file that contains the certificate and public key.3 .cer: This is a file format that stores a certificate, which is a document that binds a public key to an identity. It is also known as DER or Distinguished Encoding Rules. It is used by some applications such as OpenSSL and Java to read and write certificates.4

A security analyst needs an overview of vulnerabilities for a host on the network. Which of the following is the BEST type of scan for the analyst to run to discover which vulnerable services are running?

A.
Non-credentialed
A.
Non-credentialed
Answers
B.
Web application
B.
Web application
Answers
C.
Privileged
C.
Privileged
Answers
D.
Internal
D.
Internal
Answers
Suggested answer: C

Explanation:

Privileged scanning, also known as credentialed scanning, is a type of vulnerability scanning that uses a valid user account to log in to the target host and examine vulnerabilities from a trusted user’s perspective. It can provide more accurate and comprehensive results than unprivileged scanning, which does not use any credentials and only scans for externally visible vulnerabilities.

Which of the following identifies the point in time when an organization will recover data in the event of an outage?

A.
SLA
A.
SLA
Answers
B.
RPO
B.
RPO
Answers
C.
MTBF
C.
MTBF
Answers
D.
ARO
D.
ARO
Answers
Suggested answer: B

Explanation:

Detailed Recovery Point Objective (RPO) is the maximum duration of time that an organization can tolerate data loss in the event of an outage. It identifies the point in time when data recovery must begin, and any data loss beyond that point is considered unacceptable.

Reference: CompTIA Security+ Certification Guide, Exam SY0-601 by Mike Chapple and David Seidl, Chapter-7: Incident Response and Recovery, Objective 7.2: Compare and contrast business continuity and disaster recovery concepts, pp. 349-350.

A new security engineer has started hardening systems. One of the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability to use SCP to transfer files to the NAS, even through the data is still viewable from the user’s PCs. Which of the following is the most likely cause of this issue?

A.
TFTP was disabled on the local hosts
A.
TFTP was disabled on the local hosts
Answers
B.
SSH was turned off instead of modifying the configuration file
B.
SSH was turned off instead of modifying the configuration file
Answers
C.
Remote login was disabled in the networkd.config instead of using the sshd.conf
C.
Remote login was disabled in the networkd.config instead of using the sshd.conf
Answers
D.
Network services are no longer running on the NAS
D.
Network services are no longer running on the NAS
Answers
Suggested answer: B

Explanation:

SSH stands for Secure Shell Protocol, which is a cryptographic network protocol that allows secure remote login and command execution on a network device12. SSH can encrypt both the authentication information and the data being exchanged between the client and the server2. SSH can be used to access and manage a NAS device remotely3.

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

A.
Hashing
A.
Hashing
Answers
B.
DNS sinkhole
B.
DNS sinkhole
Answers
C.
TLS inspection
C.
TLS inspection
Answers
D.
Data masking
D.
Data masking
Answers
Suggested answer: C

Explanation:

an IDS (Intrusion Detection System) and a WAF (Web Application Firewall) are both used to monitor and protect web applications from common attacks such as cross-site scripting and SQL injection12. However, these attacks can also be hidden in encrypted HTTPS traffic, which uses the TLS (Transport Layer Security) protocol to provide cryptography and authentication between two communicating applications34. Therefore, in order for an IDS and a WAF to be effective on HTTPS traffic, they need to be able to decrypt and inspect the data that flows in the TLS tunnel. This is achieved by using a feature called TLS inspection345, which creates two dedicated TLS connections:

one with the web server and another with the client. The firewall then uses a customer-provided CA (Certificate Authority) certificate to generate an on-the-fly certificate that replaces the web server certificate and shares it with the client. This way, the firewall can see the content of the HTTPS traffic and apply the IDS and WAF rules accordingly34.

Which of the following BEST describes a technique that compensates researchers for finding vulnerabilities?

A.
Penetration testing
A.
Penetration testing
Answers
B.
Code review
B.
Code review
Answers
C.
Wardriving
C.
Wardriving
Answers
D.
Bug bounty
D.
Bug bounty
Answers
Suggested answer: D

Explanation:

A bug bounty is a technique that compensates researchers for finding vulnerabilities in software or systems. A bug bounty program is an initiative that offers rewards, usually monetary, to ethical hackers who report security flaws to the owners or developers of the software or system. Bug bounty programs are often used by companies such as Meta (formerly Facebook), Google, Microsoft, and others to improve the security of their products and services Bug bounty programs compensate researchers, often financially, for finding vulnerabilities in software, websites, or other technology. These programs provide an additional layer of security testing and incentivize researchers to report vulnerabilities instead of exploiting them.

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO)

A.
MAC filtering
A.
MAC filtering
Answers
B.
Zero trust segmentation
B.
Zero trust segmentation
Answers
C.
Network access control
C.
Network access control
Answers
D.
Access control vestibules
D.
Access control vestibules
Answers
E.
Guards
E.
Guards
Answers
F.
Bollards
F.
Bollards
Answers
Suggested answer: C, E

Explanation:


A company acquired several other small companies The company thai acquired the others is transitioning network services to the cloud The company wants to make sure that performance and security remain intact Which of the following BEST meets both requirements?

A.
High availability
A.
High availability
Answers
B.
Application security
B.
Application security
Answers
C.
Segmentation
C.
Segmentation
Answers
D.
Integration and auditing
D.
Integration and auditing
Answers
Suggested answer: A

Explanation:

High availability refers to the ability of a system or service to remain operational and available to users with minimal downtime. By ensuring high availability, the company can maintain good performance and ensure that users have access to the network services they need. High availability can also improve security, as it helps to prevent disruptions that could potentially be caused by security incidents or other issues.

A security architect is implementing a new email architecture for a company. Due to security concerns, the Chief Information Security Officer would like the new architecture to support email encryption, as well as provide for digital signatures. Which of the following should the architect implement?

A.
TOP
A.
TOP
Answers
B.
IMAP
B.
IMAP
Answers
C.
HTTPS
C.
HTTPS
Answers
D.
S/MIME
D.
S/MIME
Answers
Suggested answer: D

Explanation:

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a protocol that enables secure email messages to be sent and received. It provides email encryption, as well as digital signatures, which can be used to verify the authenticity of the sender. S/MIME can be used with a variety of email protocols, including POP and IMAP.

Reference:

https://www.comptia.org/content/guides/what-is-smime

CompTIA Security+ Study Guide, Sixth Edition (SY0-601), page 139

Total 603 questions
Go to page: of 61