ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Which of the following Is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?

A.
To provide data to quantify risk based on the organization's systems
A.
To provide data to quantify risk based on the organization's systems
Answers
B.
To keep all software and hardware fully patched for known vulnerabilities
B.
To keep all software and hardware fully patched for known vulnerabilities
Answers
C.
To only allow approved, organization-owned devices onto the business network
C.
To only allow approved, organization-owned devices onto the business network
Answers
D.
To standardize by selecting one laptop model for all users in the organization
D.
To standardize by selecting one laptop model for all users in the organization
Answers
Suggested answer: A

Explanation:

An effective asset management policy helps an organization understand and manage the systems, hardware, and software it uses, and how they are used, including their vulnerabilities and risks. This information is crucial for accurately identifying and assessing risks to the organization, and making informed decisions about how to mitigate those risks. This is the best reason to maintain an effective asset management policy.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

A company owns a public-facing e-commerce website. The company outsources credit card transactions to a payment company. Which of the following BEST describes the role of the payment company?

A.
Data controller
A.
Data controller
Answers
B.
Data custodian
B.
Data custodian
Answers
C.
Data owners
C.
Data owners
Answers
D.
Data processor
D.
Data processor
Answers
Suggested answer: D

Explanation:

A data processor is an organization that processes personal data on behalf of a data controller. In this scenario, the company that owns the e-commerce website is the data controller, as it determines the purposes and means of processing personal data (e.g. credit card information). The payment company is a data processor, as it processes personal data on behalf of the e-commerce company (i.e. it processes credit card transactions).

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

While troubleshooting a service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the BEST solution to securely prevent future issues?

A.
Using an administrator account to run the processes and disabling the account when it is not in use
A.
Using an administrator account to run the processes and disabling the account when it is not in use
Answers
B.
Implementing a shared account the team can use to run automated processes
B.
Implementing a shared account the team can use to run automated processes
Answers
C.
Configuring a service account to run the processes
C.
Configuring a service account to run the processes
Answers
D.
Removing the password complexity requirements for the user account
D.
Removing the password complexity requirements for the user account
Answers
Suggested answer: C

Explanation:

A service account is a user account that is created specifically to run automated processes and services. These accounts are typically not associated with an individual user, and are used for running background services and scheduled tasks. By configuring a service account to run the automated processes, you can ensure that the account will not be disabled due to password complexity requirements and other user-related issues.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

A company completed a vulnerability scan. The scan found malware on several systems that were running older versions of Windows. Which of the following is MOST likely the cause of the malware infection?

A.
Open permissions
A.
Open permissions
Answers
B.
Improper or weak patch management
B.
Improper or weak patch management
Answers
C.
Unsecure root accounts
C.
Unsecure root accounts
Answers
D.
Default settings
D.
Default settings
Answers
Suggested answer: B

Explanation:

The reason for this is that older versions of Windows may have known vulnerabilities that have been patched in more recent versions. If a company is not regularly patching their systems, they are leaving those vulnerabilities open to exploit, which can allow malware to infect the systems. It is important to regularly update and patch systems to address known vulnerabilities and protect against potential malware infections. This is an important aspect of proper security management. Here is a reference to the CompTIA Security+ certification guide which states that "Properly configuring and maintaining software, including patch management, is critical to protecting systems and data."

Reference: CompTIA Security+ Study Guide: SY0-601 by Emmett Dulaney, Chuck Easttom https://www.wiley.com/en-us/CompTIA+Security%2B+Study+Guide%3A+SY0-601-p-9781119515968

A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

A.
MAC filtering
A.
MAC filtering
Answers
B.
Anti-malware
B.
Anti-malware
Answers
C.
Translation gateway
C.
Translation gateway
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: D

Explanation:

A VPN (virtual private network) is a secure tunnel used to encrypt traffic and prevent unauthorized access to the internal network. It is a secure way to extend a private network across public networks, such as the Internet, and can be used to allow remote users to securely access resources on the internal network. Additionally, a VPN can be used to prevent malicious traffic from entering the internal network.

A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?

A.
Bollard
A.
Bollard
Answers
B.
Camera
B.
Camera
Answers
C.
Alarms
C.
Alarms
Answers
D.
Signage
D.
Signage
Answers
E.
Access control vestibule
E.
Access control vestibule
Answers
Suggested answer: A

Explanation:

Bollards are posts designed to prevent vehicles from entering an area. They are usually made of steel or concrete and are placed close together to make it difficult for vehicles to pass through. In addition to preventing vehicles from entering an area, bollards can also be used to protect buildings and pedestrians from ramming attacks. They are an effective and cost-efficient way to protect buildings and pedestrians from unauthorized access.

A security team will be outsourcing several key functions to a third party and will require that:

• Several of the functions will carry an audit burden.

• Attestations will be performed several times a year.

• Reports will be generated on a monthly basis.

Which of the following BEST describes the document that is used to define these requirements and stipulate how and when they are performed by the third party?

A.
MOU
A.
MOU
Answers
B.
AUP
B.
AUP
Answers
C.
SLA
C.
SLA
Answers
D.
MSA
D.
MSA
Answers
Suggested answer: C

Explanation:

A service level agreement (SLA) is a contract between a service provider and a customer that outlines the services that are to be provided and the expected levels of performance. It is used to define the requirements for the service, including any attestations and reports that must be generated, and the timescales in which these must be completed. It also outlines any penalties for failing to meet these requirements. SLAs are essential for ensuring that third-party services are meeting the agreed upon performance levels.

Reference: CompTIA Security+ Study Guide: SY0-601 by Emmett Dulaney, Chuck Easttom https://www.wiley.com/en-us/CompTIA+Security%2B+Study+Guide%3A+SY0-601-p-9781119515968 CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson https://www.amazon.com/CompTIA-Security-Certified-Ahead-SY0-601/dp/1260117558 Note: SLA is the best document that is used to define these requirements and stipulate how and when they are performed by the third party.

A network administrator needs to determine Ihe sequence of a server farm's logs. Which of the following should the administrator consider? (Select TWO).

A.
Chain of custody
A.
Chain of custody
Answers
B.
Tags
B.
Tags
Answers
C.
Reports
C.
Reports
Answers
D.
Time stamps
D.
Time stamps
Answers
E.
Hash values
E.
Hash values
Answers
F.
Time offset
F.
Time offset
Answers
Suggested answer: D, F

Explanation:

A server farm’s logs are records of events that occur on a group of servers that provide the same service or function. Logs can contain information such as date, time, source, destination, message, error code, and severity level. Logs can help administrators monitor the performance, security, and availability of the servers and troubleshoot any issues.

To determine the sequence of a server farm’s logs, the administrator should consider the following factors:

Time stamps: Time stamps are indicators of when an event occurred on a server. Time stamps can help administrators sort and correlate events across different servers based on chronological order. However, time stamps alone may not be sufficient to determine the sequence of events if the servers have different time zones or clock settings.

Time offset: Time offset is the difference between the local time of a server and a reference time, such as Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). Time offset can help administrators adjust and synchronize the time stamps of different servers to a common reference time and eliminate any discrepancies caused by time zones or clock settings.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://docs.microsoft.com/en-us/windows-server/administration/server-manager/view-event-logs

Given the following snippet of Python code:

Which of the following types of malware MOST likely contains this snippet?

A.
Logic bomb
A.
Logic bomb
Answers
B.
Keylogger
B.
Keylogger
Answers
C.
Backdoor
C.
Backdoor
Answers
D.
Ransomware
D.
Ransomware
Answers
Suggested answer: A

Explanation:

A logic bomb is a type of malware that executes malicious code when certain conditions are met. A logic bomb can be triggered by various events, such as a specific date or time, a user action, a system configuration change, or a command from an attacker. A logic bomb can perform various malicious actions, such as deleting files, encrypting data, displaying messages, or launching other malware. The snippet of Python code shows a logic bomb that executes a function called delete_all_files() when the current date is December 25th. The code uses the datetime module to get the current date and compare it with a predefined date object. If the condition is true, the code calls the delete_all_files() function, which presumably deletes all files on the system.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.kaspersky.com/resource-center/definitions/logic-bomb

A security architect is working on an email solution that will send sensitive dat a. However, funds are not currently available in the budget for building additional infrastructure. Which of the following should the architect choose?

A.
POP
A.
POP
Answers
B.
IPSec
B.
IPSec
Answers
C.
IMAP
C.
IMAP
Answers
D.
PGP
D.
PGP
Answers
Suggested answer: D

Explanation:

PGP (Pretty Good Privacy) is a commonly used encryption method for email communications to secure the sensitive data being sent. It allows for the encryption of the entire message or just the sensitive parts. It would be an appropriate solution in this case as it doesn't require additional infrastructure to implement.

Total 603 questions
Go to page: of 61