ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 20

List of questions

Question 191

Report Export Collapse

As part of annual audit requirements, the security team performed a review of exceptions to the company policy that allows specific users the ability to use USB storage devices on their laptops The review yielded the following results.

• The exception process and policy have been correctly followed by the majority of users

• A small number of users did not create tickets for the requests but were granted access

• All access had been approved by supervisors.

• Valid requests for the access sporadically occurred across multiple departments.

• Access, in most cases, had not been removed when it was no longer needed

Which of the following should the company do to ensure that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame?

Create an automated, monthly attestation process that removes access if an employee's supervisor denies the approval
Create an automated, monthly attestation process that removes access if an employee's supervisor denies the approval
Remove access for all employees and only allow new access to be granted if the employee's supervisor approves the request
Remove access for all employees and only allow new access to be granted if the employee's supervisor approves the request
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team
Perform a quarterly audit of all user accounts that have been granted access and verify the exceptions with the management team
Implement a ticketing system that tracks each request and generates reports listing which employees actively use USB storage devices
Implement a ticketing system that tracks each request and generates reports listing which employees actively use USB storage devices
Suggested answer: A
Explanation:

According to the CompTIA Security+ SY0-601 documents, the correct answer option is A. Create an automated, monthly attestation process that removes access if an employee’s supervisor denies the approval12.

This option ensures that appropriate access is not disrupted but unneeded access is removed in a reasonable time frame by requiring supervisors to approve or deny the exceptions on a regular basis. It also reduces the manual workload of the security team and improves the compliance with the company policy.

asked 02/10/2024
Francinilo Leitao Ferreira
36 questions

Question 192

Report Export Collapse

Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?

A biometric scanner
A biometric scanner
A smart card reader
A smart card reader
APKItoken
APKItoken
A PIN pad
A PIN pad
Suggested answer: A
Explanation:

A biometric scanner uses physical characteristics such as fingerprints to identify an individual user. It is used to ensure that only the authorized user is present when gaining access to a secured area.

asked 02/10/2024
aaron black
40 questions

Question 193

Report Export Collapse

A company would like to set up a secure way to transfer data between users via their mobile phones The company's top pnonty is utilizing technology that requires users to be in as close proximity as possible to each other. Which of the following connection methods would BEST fulfill this need?

Cellular
Cellular
NFC
NFC
Wi-Fi
Wi-Fi
Bluetooth
Bluetooth
Suggested answer: B
Explanation:

NFC allows two devices to communicate with each other when they are in close proximity to each other, typically within 5 centimetres. This makes it the most secure connection method for the company's data transfer requirements.

asked 02/10/2024
luigi catalano
41 questions

Question 194

Report Export Collapse

An attacker replaces a digitally signed document with another version that goes unnoticed Upon reviewing the document's contents the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?

Cryptomalware
Cryptomalware
Hash substitution
Hash substitution
Collision
Collision
Phishing
Phishing
Suggested answer: B
Explanation:

This type of attack occurs when an attacker replaces a digitally signed document with another version that has a different hash value. The author would be able to notice the additional verbiage, however, since the hash value would have changed, they would not be able to validate an integrity issue.

asked 02/10/2024
Musoke Kamuzze
32 questions

Question 195

Report Export Collapse

An employee's company account was used in a data breach Interviews with the employee revealed:

• The employee was able to avoid changing passwords by using a previous password again.

• The account was accessed from a hostile, foreign nation, but the employee has never traveled to any other countries.

Which of the following can be implemented to prevent these issues from reoccuring? (Select TWO)

Geographic dispersal
Geographic dispersal
Password complexity
Password complexity
Password history
Password history
Geotagging
Geotagging
Password lockout
Password lockout
Geofencing
Geofencing
Suggested answer: C, F
Explanation:

two possible solutions that can be implemented to prevent these issues from reoccurring are password history and geofencing12. Password history is a feature that prevents users from reusing their previous passwords1. This can enhance password security by forcing users to create new and unique passwords periodically1. Password history can be configured by setting a policy that specifies how many previous passwords are remembered and how often users must change their passwords1.

Geofencing is a feature that restricts access to a system or network based on the geographic location of the user or device2. This can enhance security by preventing unauthorized access from hostile or foreign regions2. Geofencing can be implemented by using GPS, IP address, or other methods to determine the location of the user or device and compare it with a predefined set of boundaries2.

asked 02/10/2024
Matteo Di Pomponio
43 questions

Question 196

Report Export Collapse

A company is concerned about individuals dnvmg a car into the building to gam access Which of the following security controls would work BEST to prevent this from happening?

Bollard
Bollard
Camera
Camera
Alarms
Alarms
Signage
Signage
Access control vestibule
Access control vestibule
Suggested answer: A
Explanation:

A bollard would work best to prevent individuals from driving a car into the building. A bollard is a short, vertical post that can be used to block vehicles from entering a designated area. It is specifically designed to stop cars from crashing into buildings or other structures.

Topic 2, Exam Set 2

asked 02/10/2024
Ahmed Dawoud
46 questions

Question 197

Report Export Collapse

A security analyst is using OSINT to gather information to verify whether company data is available publicly. Which of the following is the BEST application for the analyst to use?

theHarvesterB Cuckoo
theHarvesterB Cuckoo
Nmap
Nmap
Nessus
Nessus
Suggested answer: A
Explanation:

TheHarvester is a reconnaissance tool that is used to gather information about a target organization, such as email addresses, subdomains, and IP addresses. It can also be used to gather information about a target individual, such as email addresses, phone numbers, and social media profiles. TheHarvester is specifically designed for OSINT (Open-Source Intelligence) and it can be used to discover publicly available information about a target organization or individual.

asked 02/10/2024
Darren Bilmen
39 questions

Question 198

Report Export Collapse

An organization's Chief Information Security Officer is creating a position that will be responsible for implementing technical controls to protect data, including ensuring backups are properly maintained Which of the following roles would MOST likely include these responsibilities?

Data protection officer
Data protection officer
Data owner
Data owner
Backup administrator
Backup administrator
Data custodian
Data custodian
Internal auditor
Internal auditor
Suggested answer: C
Explanation:

The role that would most likely include the responsibilities of implementing technical controls to protect data and ensuring backups are properly maintained would be a Backup Administrator. A Backup Administrator is responsible for maintaining and managing an organization's backup systems and procedures, which includes ensuring that backups are properly configured, tested and securely stored. They are also responsible for the recovery of data in case of a disaster or data loss.

asked 02/10/2024
ENET SOLUTIONS LOGICOM
42 questions

Question 199

Report Export Collapse

Which of the following should customers who are involved with Ul developer agreements be concerned with when considering the use of these products on highly sensitive projects?

Weak configurations
Weak configurations
Integration activities
Integration activities
Unsecure user accounts
Unsecure user accounts
Outsourced code development
Outsourced code development
Suggested answer: A
Explanation:

Customers who are involved with Ul developer agreements should be concerned with weak configurations when considering the use of these products on highly sensitive projects. Weak configurations can lead to security vulnerabilities, which can be exploited by malicious actors. It is important to ensure that all configurations are secure and up-to-date in order to protect sensitive data. Source: UL

asked 02/10/2024
David Kimovec
40 questions

Question 200

Report Export Collapse

Which of the following would satisfy three-factor authentication requirements?

Password, PIN, and physical token
Password, PIN, and physical token
PIN, fingerprint scan, and ins scan
PIN, fingerprint scan, and ins scan
Password, fingerprint scan, and physical token
Password, fingerprint scan, and physical token
PIN, physical token, and ID card
PIN, physical token, and ID card
Suggested answer: C
Explanation:

Three-factor authentication combines three types of authentication methods: something you know (password), something you have (physical token), and something you are (fingerprint scan). Option C satisfies these requirements, as it uses a password (something you know), a physical token (something you have), and a fingerprint scan (something you are) for authentication.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom Note: There could be other options as well that could satisfy the three-factor authentication requirements as per the organization's security policies.

asked 02/10/2024
k Solaimalai Raghu Raman
51 questions
Total 603 questions
Go to page: of 61
Search

Related questions