ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











A user attempts to load a web-based application, but the expected login screen does not appear A help desk analyst troubleshoots the issue by running the following command and reviewing the output on the user's PC

The help desk analyst then runs the same command on the local PC

Which of the following BEST describes the attack that is being detected?

A.
Domain hijacking
A.
Domain hijacking
Answers
B.
DNS poisoning
B.
DNS poisoning
Answers
C.
MAC flooding
C.
MAC flooding
Answers
D.
Evil twin
D.
Evil twin
Answers
Suggested answer: B

Explanation:

DNS poisoning, also known as DNS spoofing or DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System (DNS) data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record, such as an IP address. This results in traffic being diverted to the attacker’s computer (or any other malicious destination). DNS poisoning can be performed by various methods, such as:

Intercepting and forging DNS responses from legitimate servers Compromising DNS servers and altering their records

Exploiting vulnerabilities in DNS protocols or implementations Sending malicious emails or links that trigger DNS queries with poisoned responses

According to CompTIA Security+ SY0-601 Exam Objectives 1.4 Given a scenario, analyze potential indicators to determine the type of attack:

“DNS poisoning, also known as DNS spoofing or DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System (DNS) data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record.”

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.cloudflare.com/learning/dns/dns-cache-poisoning/

Which of the following is a cryptographic concept that operates on a fixed length of bits?

A.
Block cipher
A.
Block cipher
Answers
B.
Hashing
B.
Hashing
Answers
C.
Key stretching
C.
Key stretching
Answers
D.
Salting
D.
Salting
Answers
Suggested answer: A

Explanation:

Single-key or symmetric-key encryption algorithms create a fixed length of bits known as a block cipher with a secret key that the creator/sender uses to encipher data (encryption) and the receiver uses to decipher it.

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen.Which of the following would BEST meet these requirements? (Select TWO).

A.
Full-device encryption
A.
Full-device encryption
Answers
B.
Network usage rules
B.
Network usage rules
Answers
C.
Geofencing
C.
Geofencing
Answers
D.
Containerization
D.
Containerization
Answers
E.
Application whitelisting
E.
Application whitelisting
Answers
F.
Remote control
F.
Remote control
Answers
Suggested answer: D, E

Explanation:

MDM solutions emerged to solve problems created by BYOD. With MDM, IT teams can remotely wipe devices clean if they are lost or stolen. MDM also makes the life of an IT administrator a lot easier as it allows them to enforce corporate policies, apply software updates, and even ensure that password protection is used on each device. Containerization and application whitelisting are two features of MDM that can help retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Containerization is a technique that creates a separate and secure space on the device for work- related data and applications. This way, personal and corporate data are isolated from each other, and IT admins can manage only the work container without affecting the user’s privacy. Containerization also allows IT admins to remotely wipe only the work container if needed, leaving the personal data intact.

Application whitelisting is a technique that allows only authorized applications to run on the device. This way, IT admins can prevent users from installing or using malicious or unapproved applications that might compromise the security of corporate data. Application whitelisting also allows IT admins to control which applications can access corporate resources, such as email servers or cloud storage.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.office1.com/blog/byod-vs-mdm

An organization discovered a disgruntled employee exfiltrated a large amount of PII data by uploading files Which of the following controls should the organization consider to mitigate this risk?

A.
EDR
A.
EDR
Answers
B.
Firewall
B.
Firewall
Answers
C.
HIPS
C.
HIPS
Answers
D.
DLP
D.
DLP
Answers
Suggested answer: D

Explanation:

DLP stands for data loss prevention, which is a set of tools and processes that aim to prevent unauthorized access, use, or transfer of sensitive data. DLP can help mitigate the risk of data exfiltration by disgruntled employees or external attackers by monitoring and controlling data flows across endpoints, networks, and cloud services. DLP can also detect and block attempts to copy, print, email, upload, or download sensitive data based on predefined policies and rules.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.forcepoint.com/cyber-edu/data-loss-prevention-dlp

A security team suspects that the cause of recent power consumption overloads is the unauthorized use of empty power outlets in the network rack Which of the following options will mitigate this issue without compromising the number of outlets available?

A.
Adding a new UPS dedicated to the rack
A.
Adding a new UPS dedicated to the rack
Answers
B.
Installing a managed PDU
B.
Installing a managed PDU
Answers
C.
Using only a dual power supplies unit
C.
Using only a dual power supplies unit
Answers
D.
Increasing power generator capacity
D.
Increasing power generator capacity
Answers
Suggested answer: B

Explanation:

A managed Power Distribution Unit (PDU) allows you to monitor and control power outlets on the rack. This will allow the security team to identify which devices are drawing power and from which outlets, which can help to identify any unauthorized devices. Moreover, with a managed PDU, you can also control the power to outlets, turn off outlets that are not in use, and set up alerts if an outlet is overloaded. This will help to mitigate the issue of power consumption overloads without compromising the number of outlets available.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

An employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm employee's identity before sending him the prize. Which of the following BEST describes this type of email?

A.
Spear phishing
A.
Spear phishing
Answers
B.
Whaling
B.
Whaling
Answers
C.
Phishing
C.
Phishing
Answers
D.
Vishing
D.
Vishing
Answers
Suggested answer: C

Explanation:

Phishing is a type of social engineering attack that uses fraudulent emails or other forms of communication to trick users into revealing sensitive information, such as passwords, credit card numbers, or personal details. Phishing emails often impersonate legitimate entities, such as banks, online services, or lottery organizations, and entice users to click on malicious links or attachments that lead to fake websites or malware downloads. Phishing emails usually target a large number of users indiscriminately, hoping that some of them will fall for the scam.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.kaspersky.com/resource-center/definitions/what-is-phishing

An organization wants to enable built-in FDE on all laptops Which of the following should the organization ensure is Installed on all laptops?

A.
TPM
A.
TPM
Answers
B.
CA
B.
CA
Answers
C.
SAML
C.
SAML
Answers
D.
CRL
D.
CRL
Answers
Suggested answer: A

Explanation:

The organization should ensure that a Trusted Platform Module (TPM) is installed on all laptops in order to enable built-in Full Disk Encryption (FDE). TPM is a hardware-based security chip that stores encryption keys and helps to protect data from malicious attacks. It is important to ensure that the TPM is properly configured and enabled in order to get the most out of FDE.

A security administrator is working on a solution to protect passwords stored in a database against rainbow table attacks Which of the following should the administrator consider?

A.
Hashing
A.
Hashing
Answers
B.
Salting
B.
Salting
Answers
C.
Lightweight cryptography
C.
Lightweight cryptography
Answers
D.
Steganography
D.
Steganography
Answers
Suggested answer: B

Explanation:

Salting is a technique that adds random data to a password before hashing it. This makes the hash output more unique and unpredictable, and prevents attackers from using precomputed tables (such as rainbow tables) to crack the password hash. Salting also reduces the risk of collisions, which occur when different passwords produce the same hash.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/

Which of the following biometric authentication methods is the MOST accurate?

A.
Gait
A.
Gait
Answers
B.
Retina
B.
Retina
Answers
C.
Signature
C.
Signature
Answers
D.
Voice
D.
Voice
Answers
Suggested answer: B

Explanation:

Retina authentication is the most accurate biometric authentication method. Retina authentication is based on recognizing the unique pattern of blood vessels and other features in the retina. This makes it virtually impossible to duplicate or bypass, making it the most secure form of biometric authentication currently available.

Which of the following BEST describes the team that acts as a referee during a penetration-testing exercise?

A.
White team
A.
White team
Answers
B.
Purple team
B.
Purple team
Answers
C.
Green team
C.
Green team
Answers
D.
Blue team
D.
Blue team
Answers
E.
Red team
E.
Red team
Answers
Suggested answer: A

Explanation:

During a penetration testing exercise, the white team is responsible for acting as a referee and providing oversight and support to ensure that the testing is conducted safely and effectively. They may also be responsible for determining the rules and guidelines of the exercise, monitoring the progress of the teams, and providing feedback and insights on the strengths and weaknesses of the organization's security measures.

Total 603 questions
Go to page: of 61