ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

A security administrator wants to implement a program that tests a user's ability to recognize attacks over the organization's email system Which of the following would be BEST suited for this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

A third party asked a user to share a public key for secure communication. Which of the following file formats should the user choose to share the key?

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

A security analyst needs an overview of vulnerabilities for a host on the network. Which of the following is the BEST type of scan for the analyst to run to discover which vulnerable services are running?

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

Which of the following identifies the point in time when an organization will recover data in the event of an outage?

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

A new security engineer has started hardening systems. One of the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability to use SCP to transfer files to the NAS, even through the data is still viewable from the user’s PCs. Which of the following is the most likely cause of this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

Which of the following BEST describes a technique that compensates researchers for finding vulnerabilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO)

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

A company acquired several other small companies The company thai acquired the others is transitioning network services to the cloud The company wants to make sure that performance and security remain intact Which of the following BEST meets both requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

A security architect is implementing a new email architecture for a company. Due to security concerns, the Chief Information Security Officer would like the new architecture to support email encryption, as well as provide for digital signatures. Which of the following should the architect implement?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions