ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











A security administrator Installed a new web server. The administrator did this to Increase the capacity (or an application due to resource exhaustion on another server. Which o( the following algorithms should the administrator use to split the number of the connections on each server In half?

A.
Weighted response
A.
Weighted response
Answers
B.
Round-robin
B.
Round-robin
Answers
C.
Least connection
C.
Least connection
Answers
D.
Weighted least connection
D.
Weighted least connection
Answers
Suggested answer: B

Explanation:

The administrator should use a round-robin algorithm to split the number of connections on each server in half. Round-robin is a load-balancing algorithm that distributes incoming requests to the available servers one by one in a cyclical order. This helps to evenly distribute the load across all of the servers, ensuring that no single server is overloaded.

A large bank with two geographically dispersed data centers Is concerned about major power disruptions at Both locations. Every day each location experiences very brief outages thai last (or a few seconds. However, during the summer a high risk of intentional under-voltage events that could last up to an hour exists, particularly at one of the locations near an industrial smelter. Which of the following is the BEST solution to reduce the risk of data loss?

A.
Dual supply
A.
Dual supply
Answers
B.
Generator
B.
Generator
Answers
C.
PDU
C.
PDU
Answers
D.
Dally backups
D.
Dally backups
Answers
Suggested answer: B

Explanation:

A generator will provide uninterrupted power to the data centers, ensuring that they are not affected by any power disruptions, intentional or otherwise. This is more reliable than a dual supply or a PDU, and more effective than daily backups, which would not be able to protect against an outage lasting an hour.

A security administrator Is managing administrative access to sensitive systems with the following requirements:

• Common login accounts must not be used (or administrative duties.

• Administrative accounts must be temporal in nature.

• Each administrative account must be assigned to one specific user.

• Accounts must have complex passwords.

• Audit trails and logging must be enabled on all systems.

Which of the following solutions should the administrator deploy to meet these requirements?

A.
ABAC
A.
ABAC
Answers
B.
SAML
B.
SAML
Answers
C.
PAM
C.
PAM
Answers
D.
CASB
D.
CASB
Answers
Suggested answer: C

Explanation:

The best solution to meet the given requirements is to deploy a Privileged Access Management (PAM) solution. PAM solutions allow administrators to create and manage administrative accounts that are assigned to specific users and that have complex passwords. Additionally, PAM solutions provide the ability to enable audit trails and logging on all systems, as well as to set up temporal access for administrative accounts. SAML, ABAC, and CASB are not suitable for this purpose.

A security administrator Is evaluating remote access solutions for employees who are geographically dispersed. Which of the following would provide the MOST secure remote access? (Select TWO).

A.
IPSec
A.
IPSec
Answers
B.
SFTP
B.
SFTP
Answers
C.
SRTP
C.
SRTP
Answers
D.
LDAPS
D.
LDAPS
Answers
E.
S/MIME
E.
S/MIME
Answers
F.
SSL VPN
F.
SSL VPN
Answers
Suggested answer: A, F

Explanation:

IPSec (Internet Protocol Security) is a technology that provides secure communication over the internet by encrypting traffic and authenticating it at both the sender and receiver. It can be used to create secure tunnels between two or more devices, allowing users to access resources securely and privately.

SSL VPN (Secure Sockets Layer Virtual Private Network) is a type of VPN that uses an SSL/TLS connection to encrypt traffic between two or more devices. It is a secure and reliable solution for providing remote access, as all traffic is encrypted and authenticated. Additionally, SSL VPNs can also be used to restrict access to certain websites and services, making them a secure and robust solution for remote access.

Audit logs indicate an administrative account that belongs to a security engineer has been locked out multiple times during the day. The security engineer has been on vacation (or a few days. Which of the following attacks can the account lockout be attributed to?

A.
Backdoor
A.
Backdoor
Answers
B.
Brute-force
B.
Brute-force
Answers
C.
Rootkit
C.
Rootkit
Answers
D.
Trojan
D.
Trojan
Answers
Suggested answer: B

Explanation:

The account lockout can be attributed to a brute-force attack. A brute-force attack is a type of attack where an attacker attempts to guess a user's password by continually trying different combinations of characters. In this case, it is likely that the security engineer's account was locked out due to an attacker attempting to guess their password. Backdoor, rootkit, and Trojan attacks are not relevant in this scenario.

A security architect is designing the new outbound internet for a small company. The company would like all 50 users to share the same single Internet connection. In addition, users will not be permitted to use social media sites or external email services while at work. Which of the following should be included in this design to satisfy these requirements? (Select TWO).

A.
DLP
A.
DLP
Answers
B.
MAC filtering
B.
MAC filtering
Answers
C.
NAT
C.
NAT
Answers
D.
VPN
D.
VPN
Answers
E.
Content filler
E.
Content filler
Answers
F.
WAF
F.
WAF
Answers
Suggested answer: C, D

Explanation:

NAT (Network Address Translation) is a technology that allows multiple devices to share a single IP address, allowing them to access the internet while still maintaining security and privacy. VPN (Virtual Private Network) is a technology that creates a secure, encrypted tunnel between two or more devices, allowing users to access the internet and other network resources securely and privately. Additionally, VPNs can also be used to restrict access to certain websites and services, such as social media sites and external email services.

Sales team members have been receiving threatening voicemail messages and have reported these incidents to the IT security team. Which of the following would be MOST appropriate for the IT security team to analyze?

A.
Access control
A.
Access control
Answers
B.
Syslog
B.
Syslog
Answers
C.
Session Initiation Protocol traffic logs
C.
Session Initiation Protocol traffic logs
Answers
D.
Application logs
D.
Application logs
Answers
Suggested answer: B

Explanation:

Syslogs are log files that are generated by devices on the network and contain information about network activity, including user logins, device connections, and other events. By analyzing these logs, the IT security team can identify the source of the threatening voicemail messages and take the necessary steps to address the issue

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO).

A.
MAC filtering
A.
MAC filtering
Answers
B.
Zero trust segmentation
B.
Zero trust segmentation
Answers
C.
Network access control
C.
Network access control
Answers
D.
Access control vestibules
D.
Access control vestibules
Answers
E.
Guards
E.
Guards
Answers
F.
Bollards.
F.
Bollards.
Answers
Suggested answer: C, E

Explanation:

Network access control (NAC) is a technique that restricts access to a network based on the identity, role, device, location, or other criteria of the users or devices. NAC can prevent unauthorized or malicious devices from connecting to a network and accessing sensitive data or resources. Guards are physical security personnel who monitor and control access to a facility. Guards can prevent unauthorized or malicious individuals from entering a facility and plugging in a remotely accessible device.


Which ol the following is required in order (or an IDS and a WAF to be effective on HTTPS traffic?

A.
Hashing
A.
Hashing
Answers
B.
DNS sinkhole
B.
DNS sinkhole
Answers
C.
TLS inspection
C.
TLS inspection
Answers
D.
Data masking
D.
Data masking
Answers
Suggested answer: C

Explanation:

TLS (Transport Layer Security) is a protocol that is used to encrypt data sent over HTTPS (Hypertext Transfer Protocol Secure). In order for an intrusion detection system (IDS) and a web application firewall (WAF) to be effective on HTTPS traffic, they must be able to inspect the encrypted traffic. TLS inspection allows the IDS and WAF to decrypt and inspect the traffic, allowing them to detect any malicious activity. Reference: [1] CompTIA Security+ Study Guide Exam SY0-601 [1], Sixth Edition, Chapter 11, "Network Security Monitoring" [2] CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide, Chapter 7, "Intrusion Detection and Prevention"

A network architect wants a server to have the ability to retain network availability even if one of the network switches it is connected to goes down. Which of the following should the architect implement on the server to achieve this goal?

A.
RAID
A.
RAID
Answers
B.
UPS
B.
UPS
Answers
C.
NIC teaming
C.
NIC teaming
Answers
D.
Load balancing
D.
Load balancing
Answers
Suggested answer: C

Explanation:

NIC Teaming is a feature that allows a server to be connected to multiple network switches, providing redundancy and increased network availability. If one of the switches goes down, the server will still be able to send and receive data through one of the other switches. To configure NIC Teaming in Windows Server, see Microsoft's documentation: https://docs.microsoft.com/en- us/windows-server/networking/technologies/nic-teaming. For more information on NIC Teaming and other network redundancy features, refer to the CompTIA Security+ SY0-601 Official Text Book and Resources.

Total 603 questions
Go to page: of 61