ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 25

Add to Whishlist

List of questions

Question 241

Report Export Collapse

A security team suspects that the cause of recent power consumption overloads is the unauthorized use of empty power outlets in the network rack. Which of the following options will mitigate this issue without compromising the number of outlets available?

Become a Premium Member for full access
  Unlock Premium Member

Question 242

Report Export Collapse

A web server log contains two million lines. A security analyst wants to obtain the next 500 lines starting from line 4,600. Which of the following commands will help the security analyst to achieve this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 243

Report Export Collapse

A security engineer is concerned the strategy for detection on endpoints is too heavily dependent on previously defined attacks. The engineer wants a tool that can monitor for changes to key files and network traffic for the device. Which of the following tools should the engineer select?

Become a Premium Member for full access
  Unlock Premium Member

Question 244

Report Export Collapse

Which of the following would a security analyst use to determine if other companies in the same sector have seen similar malicious activity against their systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 245

Report Export Collapse

A cybersecurity analyst needs to adopt controls to properly track and log user actions to an individual. Which of the following should the analyst implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 246

Report Export Collapse

A company would like to move to the cloud. The company wants to prioritize control and security over cost and ease of management. Which of the following cloud models would best suit this company's priorities?

Become a Premium Member for full access
  Unlock Premium Member

Question 247

Report Export Collapse

Which of the following should be addressed first on security devices before connecting to the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 248

Report Export Collapse

A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the best way to secure a replacement computer and deter future theft?

Become a Premium Member for full access
  Unlock Premium Member

Question 249

Report Export Collapse

Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?

Become a Premium Member for full access
  Unlock Premium Member

Question 250

Report Export Collapse

Which of the following can be used to calculate the total loss expected per year due to a threat targeting an asset?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions