ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 21

List of questions

Question 201

Report
Export
Collapse

Which of the following Is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?

To provide data to quantify risk based on the organization's systems
To provide data to quantify risk based on the organization's systems
To keep all software and hardware fully patched for known vulnerabilities
To keep all software and hardware fully patched for known vulnerabilities
To only allow approved, organization-owned devices onto the business network
To only allow approved, organization-owned devices onto the business network
To standardize by selecting one laptop model for all users in the organization
To standardize by selecting one laptop model for all users in the organization
Suggested answer: A

Explanation:

An effective asset management policy helps an organization understand and manage the systems, hardware, and software it uses, and how they are used, including their vulnerabilities and risks. This information is crucial for accurately identifying and assessing risks to the organization, and making informed decisions about how to mitigate those risks. This is the best reason to maintain an effective asset management policy.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

asked 02/10/2024
John Kaye
29 questions

Question 202

Report
Export
Collapse

A company owns a public-facing e-commerce website. The company outsources credit card transactions to a payment company. Which of the following BEST describes the role of the payment company?

Data controller
Data controller
Data custodian
Data custodian
Data owners
Data owners
Data processor
Data processor
Suggested answer: D

Explanation:

A data processor is an organization that processes personal data on behalf of a data controller. In this scenario, the company that owns the e-commerce website is the data controller, as it determines the purposes and means of processing personal data (e.g. credit card information). The payment company is a data processor, as it processes personal data on behalf of the e-commerce company (i.e. it processes credit card transactions).

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

asked 02/10/2024
Carlos Periterra
40 questions

Question 203

Report
Export
Collapse

While troubleshooting a service disruption on a mission-critical server, a technician discovered the user account that was configured to run automated processes was disabled because the user's password failed to meet password complexity requirements. Which of the following would be the BEST solution to securely prevent future issues?

Using an administrator account to run the processes and disabling the account when it is not in use
Using an administrator account to run the processes and disabling the account when it is not in use
Implementing a shared account the team can use to run automated processes
Implementing a shared account the team can use to run automated processes
Configuring a service account to run the processes
Configuring a service account to run the processes
Removing the password complexity requirements for the user account
Removing the password complexity requirements for the user account
Suggested answer: C

Explanation:

A service account is a user account that is created specifically to run automated processes and services. These accounts are typically not associated with an individual user, and are used for running background services and scheduled tasks. By configuring a service account to run the automated processes, you can ensure that the account will not be disabled due to password complexity requirements and other user-related issues.

Reference: CompTIA Security+ Study Guide (SY0-601) 7th Edition by Emmett Dulaney, Chuck Easttom

asked 02/10/2024
Lazar Marinovic
34 questions

Question 204

Report
Export
Collapse

A company completed a vulnerability scan. The scan found malware on several systems that were running older versions of Windows. Which of the following is MOST likely the cause of the malware infection?

Open permissions
Open permissions
Improper or weak patch management
Improper or weak patch management
Unsecure root accounts
Unsecure root accounts
Default settings
Default settings
Suggested answer: B

Explanation:

The reason for this is that older versions of Windows may have known vulnerabilities that have been patched in more recent versions. If a company is not regularly patching their systems, they are leaving those vulnerabilities open to exploit, which can allow malware to infect the systems. It is important to regularly update and patch systems to address known vulnerabilities and protect against potential malware infections. This is an important aspect of proper security management. Here is a reference to the CompTIA Security+ certification guide which states that "Properly configuring and maintaining software, including patch management, is critical to protecting systems and data."

Reference: CompTIA Security+ Study Guide: SY0-601 by Emmett Dulaney, Chuck Easttom https://www.wiley.com/en-us/CompTIA+Security%2B+Study+Guide%3A+SY0-601-p-9781119515968

asked 02/10/2024
Patrick Herrington
37 questions

Question 205

Report
Export
Collapse

A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

MAC filtering
MAC filtering
Anti-malware
Anti-malware
Translation gateway
Translation gateway
VPN
VPN
Suggested answer: D

Explanation:

A VPN (virtual private network) is a secure tunnel used to encrypt traffic and prevent unauthorized access to the internal network. It is a secure way to extend a private network across public networks, such as the Internet, and can be used to allow remote users to securely access resources on the internal network. Additionally, a VPN can be used to prevent malicious traffic from entering the internal network.

asked 02/10/2024
Euwing Mendoza
44 questions

Question 206

Report
Export
Collapse

A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?

Bollard
Bollard
Camera
Camera
Alarms
Alarms
Signage
Signage
Access control vestibule
Access control vestibule
Suggested answer: A

Explanation:

Bollards are posts designed to prevent vehicles from entering an area. They are usually made of steel or concrete and are placed close together to make it difficult for vehicles to pass through. In addition to preventing vehicles from entering an area, bollards can also be used to protect buildings and pedestrians from ramming attacks. They are an effective and cost-efficient way to protect buildings and pedestrians from unauthorized access.

asked 02/10/2024
Medard Vedasto
38 questions

Question 207

Report
Export
Collapse

A security team will be outsourcing several key functions to a third party and will require that:

• Several of the functions will carry an audit burden.

• Attestations will be performed several times a year.

• Reports will be generated on a monthly basis.

Which of the following BEST describes the document that is used to define these requirements and stipulate how and when they are performed by the third party?

MOU
MOU
AUP
AUP
SLA
SLA
MSA
MSA
Suggested answer: C

Explanation:

A service level agreement (SLA) is a contract between a service provider and a customer that outlines the services that are to be provided and the expected levels of performance. It is used to define the requirements for the service, including any attestations and reports that must be generated, and the timescales in which these must be completed. It also outlines any penalties for failing to meet these requirements. SLAs are essential for ensuring that third-party services are meeting the agreed upon performance levels.

Reference: CompTIA Security+ Study Guide: SY0-601 by Emmett Dulaney, Chuck Easttom https://www.wiley.com/en-us/CompTIA+Security%2B+Study+Guide%3A+SY0-601-p-9781119515968 CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide by Darril Gibson https://www.amazon.com/CompTIA-Security-Certified-Ahead-SY0-601/dp/1260117558 Note: SLA is the best document that is used to define these requirements and stipulate how and when they are performed by the third party.

asked 02/10/2024
takasuka masahide
39 questions

Question 208

Report
Export
Collapse

A network administrator needs to determine Ihe sequence of a server farm's logs. Which of the following should the administrator consider? (Select TWO).

Chain of custody
Chain of custody
Tags
Tags
Reports
Reports
Time stamps
Time stamps
Hash values
Hash values
Time offset
Time offset
Suggested answer: D, F

Explanation:

A server farm’s logs are records of events that occur on a group of servers that provide the same service or function. Logs can contain information such as date, time, source, destination, message, error code, and severity level. Logs can help administrators monitor the performance, security, and availability of the servers and troubleshoot any issues.

To determine the sequence of a server farm’s logs, the administrator should consider the following factors:

Time stamps: Time stamps are indicators of when an event occurred on a server. Time stamps can help administrators sort and correlate events across different servers based on chronological order. However, time stamps alone may not be sufficient to determine the sequence of events if the servers have different time zones or clock settings.

Time offset: Time offset is the difference between the local time of a server and a reference time, such as Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). Time offset can help administrators adjust and synchronize the time stamps of different servers to a common reference time and eliminate any discrepancies caused by time zones or clock settings.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://docs.microsoft.com/en-us/windows-server/administration/server-manager/view-event-logs

asked 02/10/2024
Hendrik van Bemmel
32 questions

Question 209

Report
Export
Collapse

Given the following snippet of Python code:

CompTIA SY0-601 image Question 200 98290 10022024175359000000

Which of the following types of malware MOST likely contains this snippet?

Logic bomb
Logic bomb
Keylogger
Keylogger
Backdoor
Backdoor
Ransomware
Ransomware
Suggested answer: A

Explanation:

A logic bomb is a type of malware that executes malicious code when certain conditions are met. A logic bomb can be triggered by various events, such as a specific date or time, a user action, a system configuration change, or a command from an attacker. A logic bomb can perform various malicious actions, such as deleting files, encrypting data, displaying messages, or launching other malware. The snippet of Python code shows a logic bomb that executes a function called delete_all_files() when the current date is December 25th. The code uses the datetime module to get the current date and compare it with a predefined date object. If the condition is true, the code calls the delete_all_files() function, which presumably deletes all files on the system.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.kaspersky.com/resource-center/definitions/logic-bomb

asked 02/10/2024
Mathijn Smit
41 questions

Question 210

Report
Export
Collapse

A security architect is working on an email solution that will send sensitive dat a. However, funds are not currently available in the budget for building additional infrastructure. Which of the following should the architect choose?

POP
POP
IPSec
IPSec
IMAP
IMAP
PGP
PGP
Suggested answer: D

Explanation:

PGP (Pretty Good Privacy) is a commonly used encryption method for email communications to secure the sensitive data being sent. It allows for the encryption of the entire message or just the sensitive parts. It would be an appropriate solution in this case as it doesn't require additional infrastructure to implement.

asked 02/10/2024
Mashudu Abraham
34 questions
Total 603 questions
Go to page: of 61
Search

Related questions