ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops The review yielded the following results.

• The exception process and policy have been correctly followed by the majority of users

• A small number of users did not create tickets for the requests but were granted access

• All access had been approved by supervisors.

• Valid requests for the access sporadically occurred across multiple departments.

• Access, in most cases, had not been removed when it was no longer needed

Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?

A.
Create an automated, monthly attestation process that removes access if an employee's supervisor denies the approval
A.
Create an automated, monthly attestation process that removes access if an employee's supervisor denies the approval
Answers
B.
Remove access for all employees and only allow new access to be granted if the employee's supervisor approves the request
B.
Remove access for all employees and only allow new access to be granted if the employee's supervisor approves the request
Answers
C.
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team
C.
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team
Answers
D.
Implement a ticketing system that tracks each request and generates reports listing which employees actively use USB storage devices
D.
Implement a ticketing system that tracks each request and generates reports listing which employees actively use USB storage devices
Answers
Suggested answer: A

Explanation:

According to the CompTIA Security+ SY0-601 documents, the correct answer option is A. Create an automated, monthly attestation process that removes access if an employee’s supervisor denies the approval12.

This option ensures that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame by requiring supervisors to approve or deny the exceptions on a regular basis. It also reduces the manual workload of the security team and improves the compliance with the company policy.

Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?

A.
A biometric scanner
A.
A biometric scanner
Answers
B.
A smart card reader
B.
A smart card reader
Answers
C.
APKItoken
C.
APKItoken
Answers
D.
A PIN pad
D.
A PIN pad
Answers
Suggested answer: A

Explanation:

A biometric scanner uses physical characteristics such as fingerprints to identify an individual user. It is used to ensure that only the authorized user is present when gaining access to a secured area.

A company would like to set up a secure way to transfer data between users via their mobile phones The company's top pnonty is utilizing technology that requires users to be in as close proximity as possible to each other. Which of the following connection methods would BEST fulfill this need?

A.
Cellular
A.
Cellular
Answers
B.
NFC
B.
NFC
Answers
C.
Wi-Fi
C.
Wi-Fi
Answers
D.
Bluetooth
D.
Bluetooth
Answers
Suggested answer: B

Explanation:

NFC allows two devices to communicate with each other when they are in close proximity to each other, typically within 5 centimetres. This makes it the most secure connection method for the company's data transfer requirements.

An attacker replaces a digitally signed document with another version that goes unnoticed Upon reviewing the document's contents the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?

A.
Cryptomalware
A.
Cryptomalware
Answers
B.
Hash substitution
B.
Hash substitution
Answers
C.
Collision
C.
Collision
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: B

Explanation:

This type of attack occurs when an attacker replaces a digitally signed document with another version that has a different hash value. The author would be able to notice the additional verbiage, however, since the hash value would have changed, they would not be able to validate an integrity issue.

An employee's company account was used in a data breach Interviews with the employee revealed:

• The employee was able to avoid changing passwords by using a previous password again.

• The account was accessed from a hostile, foreign nation, but the employee has never traveled to any other countries.

Which of the following can be implemented to prevent these issues from reoccuring? (Select TWO)

A.
Geographic dispersal
A.
Geographic dispersal
Answers
B.
Password complexity
B.
Password complexity
Answers
C.
Password history
C.
Password history
Answers
D.
Geotagging
D.
Geotagging
Answers
E.
Password lockout
E.
Password lockout
Answers
F.
Geofencing
F.
Geofencing
Answers
Suggested answer: C, F

Explanation:

two possible solutions that can be implemented to prevent these issues from reoccurring are password history and geofencing12. Password history is a feature that prevents users from reusing their previous passwords1. This can enhance password security by forcing users to create new and unique passwords periodically1. Password history can be configured by setting a policy that specifies how many previous passwords are remembered and how often users must change their passwords1.

Geofencing is a feature that restricts access to a system or network based on the geographic location of the user or device2. This can enhance security by preventing unauthorized access from hostile or foreign regions2. Geofencing can be implemented by using GPS, IP address, or other methods to determine the location of the user or device and compare it with a predefined set of boundaries2.

A company is concerned about individuals dnvmg a car into the building to gam access Which of the following security controls would work BEST to prevent this from happening?

A.
Bollard
A.
Bollard
Answers
B.
Camera
B.
Camera
Answers
C.
Alarms
C.
Alarms
Answers
D.
Signage
D.
Signage
Answers
E.
Access control vestibule
E.
Access control vestibule
Answers
Suggested answer: A

Explanation:

A bollard would work best to prevent individuals from driving a car into the building. A bollard is a short, vertical post that can be used to block vehicles from entering a designated area. It is specifically designed to stop cars from crashing into buildings or other structures.

Topic 2, Exam Set 2

A security analyst is using OSINT to gather information to verify whether company data is available publicly. Which of the following is the BEST application for the analyst to use?

A.
theHarvesterB Cuckoo
A.
theHarvesterB Cuckoo
Answers
B.
Nmap
B.
Nmap
Answers
C.
Nessus
C.
Nessus
Answers
Suggested answer: A

Explanation:

TheHarvester is a reconnaissance tool that is used to gather information about a target organization, such as email addresses, subdomains, and IP addresses. It can also be used to gather information about a target individual, such as email addresses, phone numbers, and social media profiles. TheHarvester is specifically designed for OSINT (Open-Source Intelligence) and it can be used to discover publicly available information about a target organization or individual.

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained Which of the following roles would MOST likely include these responsibilities?

A.
Data protection officer
A.
Data protection officer
Answers
B.
Data owner
B.
Data owner
Answers
C.
Backup administrator
C.
Backup administrator
Answers
D.
Data custodian
D.
Data custodian
Answers
E.
Internal auditor
E.
Internal auditor
Answers
Suggested answer: C

Explanation:

The role that would most likely include the responsibilities of implementing technical controls to protect data and ensuring backups are properly maintained would be a Backup Administrator. A Backup Administrator is responsible for maintaining and managing an organization's backup systems and procedures, which includes ensuring that backups are properly configured, tested and securely stored. They are also responsible for the recovery of data in case of a disaster or data loss.

Which of the following should customers who are involved with Ul developer agreements be concerned with when considering the use of these products on highly sensitive projects?

A.
Weak configurations
A.
Weak configurations
Answers
B.
Integration activities
B.
Integration activities
Answers
C.
Unsecure user accounts
C.
Unsecure user accounts
Answers
D.
Outsourced code development
D.
Outsourced code development
Answers
Suggested answer: A

Explanation:

Customers who are involved with Ul developer agreements should be concerned with weak configurations when considering the use of these products on highly sensitive projects. Weak configurations can lead to security vulnerabilities, which can be exploited by malicious actors. It is important to ensure that all configurations are secure and up-to-date in order to protect sensitive data. Source: UL

Which of the following would satisfy three-factor authentication requirements?

A.
Password, PIN, and physical token
A.
Password, PIN, and physical token
Answers
B.
PIN, fingerprint scan, and ins scan
B.
PIN, fingerprint scan, and ins scan
Answers
C.
Password, fingerprint scan, and physical token
C.
Password, fingerprint scan, and physical token
Answers
D.
PIN, physical token, and ID card
D.
PIN, physical token, and ID card
Answers
Suggested answer: C

Explanation:

Three-factor authentication combines three types of authentication methods: something you know (password), something you have (physical token), and something you are (fingerprint scan). Option C satisfies these requirements, as it uses a password (something you know), a physical token (something you have), and a fingerprint scan (something you are) for authentication.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom Note: There could be other options as well that could satisfy the three-factor authentication requirements as per the organization's security policies.

Total 603 questions
Go to page: of 61