ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











A security team suspects that the cause of recent power consumption overloads is the unauthorized use of empty power outlets in the network rack. Which of the following options will mitigate this issue without compromising the number of outlets available?

A.
Adding a new UPS dedicated to the rack
A.
Adding a new UPS dedicated to the rack
Answers
B.
Installing a managed PDU
B.
Installing a managed PDU
Answers
C.
Using only a dual power supplies unit
C.
Using only a dual power supplies unit
Answers
D.
Increasing power generator capacity
D.
Increasing power generator capacity
Answers
Suggested answer: B

Explanation:

Installing a managed PDU is the most appropriate option to mitigate the issue without compromising the number of outlets available. A managed Power Distribution Unit (PDU) helps monitor, manage, and control power consumption at the rack level. By installing a managed PDU, the security team will have greater visibility into power usage in the network rack, and they can identify and eliminate unauthorized devices that consume excessive power from empty outlets. https://www.comptia.org/training/books/security-sy0-601-study-guide

A web server log contains two million lines. A security analyst wants to obtain the next 500 lines starting from line 4,600. Which of the following commands will help the security analyst to achieve this objective?

A.
cat webserver.log | head -4600 | tail +500 |
A.
cat webserver.log | head -4600 | tail +500 |
Answers
B.
cat webserver.log | tail -1995400 | tail -500 |
B.
cat webserver.log | tail -1995400 | tail -500 |
Answers
C.
cat webserver.log | tail -4600 | head -500 |
C.
cat webserver.log | tail -4600 | head -500 |
Answers
D.
cat webserver.log | head -5100 | tail -500 |
D.
cat webserver.log | head -5100 | tail -500 |
Answers
Suggested answer: D

Explanation:

the cat command displays the contents of a file, the head command displays the first lines of a file, and the tail command displays the last lines of a file. To display a specific number of lines from a file, you can use a minus sign followed by a number as an option for head or tail. For example, head -10 will display the first 10 lines of a file.

To obtain the next 500 lines starting from line 4,600, you need to use both head and tail commands. https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/file-manipulation-tools/

A security engineer is concerned the strategy for detection on endpoints is too heavily dependent on previously defined attacks. The engineer wants a tool that can monitor for changes to key files and network traffic for the device. Which of the following tools should the engineer select?

A.
HIDS
A.
HIDS
Answers
B.
AV
B.
AV
Answers
C.
NGF-W
C.
NGF-W
Answers
D.
DLP
D.
DLP
Answers
Suggested answer: A

Explanation:

The security engineer should select a Host Intrusion Detection System (HIDS) to address the concern. HIDS monitors and analyzes the internals of a computing system, such as key files and network traffic, for any suspicious activity. Unlike antivirus software (AV), which relies on known signatures of malware, HIDS can detect anomalies, policy violations, and previously undefined attacks by monitoring system behavior and the network traffic of the device.

Reference:

1. CompTIA Security+ Certification Exam Objectives (SY0-601):

https://www.comptia.jp/pdf/Security%2B%20SY0-601%20Exam%20Objectives.pdf

2. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS):

Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-94. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-94.pdf

Which of the following would a security analyst use to determine if other companies in the same sector have seen similar malicious activity against their systems?

A.
Vulnerability scanner
A.
Vulnerability scanner
Answers
B.
Open-source intelligence
B.
Open-source intelligence
Answers
C.
Packet capture
C.
Packet capture
Answers
D.
Threat feeds
D.
Threat feeds
Answers
Suggested answer: D

Explanation:

Threat feeds, also known as threat intelligence feeds, are a source of information about current and emerging threats, vulnerabilities, and malicious activities targeting organizations. Security analysts use threat feeds to gather information about attacks and threats targeting their industry or sector. These feeds are typically provided by security companies, research organizations, or industry-specific groups. By using threat feeds, analysts can identify trends, patterns, and potential threats that may target their own organization, allowing them to take proactive steps to protect their systems.

Reference:

1. CompTIA Security+ Certification Exam Objectives (SY0-601):

https://www.comptia.jp/pdf/Security%2B%20SY0-601%20Exam%20Objectives.pdf

2. SANS Institute: Threat Intelligence: What It Is, and How to Use It Effectively:

https://www.sans.org-room/whitepapers/analyst/threat-intelligence-is-effectively-36367

A cybersecurity analyst needs to adopt controls to properly track and log user actions to an individual. Which of the following should the analyst implement?

A.
Non-repudiation
A.
Non-repudiation
Answers
B.
Baseline configurations
B.
Baseline configurations
Answers
C.
MFA
C.
MFA
Answers
D.
DLP
D.
DLP
Answers
Suggested answer: A

Explanation:

Non-repudiation is the process of ensuring that a party involved in a transaction or communication cannot deny their involvement. By implementing non-repudiation controls, a cybersecurity analyst can properly track and log user actions, attributing them to a specific individual. This can be achieved through methods such as digital signatures, timestamps, and secure logging mechanisms.

Reference:

1. CompTIA Security+ Certification Exam Objectives (SY0-601):

https://www.comptia.jp/pdf/CompTIA%20Security%2B%20SY0-601%20Exam%20Objectives.pdf

2. Stewart, J. M., Chapple, M., & Gibson, D. (2021). CompTIA Security+ Study Guide: Exam SY0-601. John Wiley & Sons.

A company would like to move to the cloud. The company wants to prioritize control and security over cost and ease of management. Which of the following cloud models would best suit this company's priorities?

A.
Public
A.
Public
Answers
B.
Hybrid
B.
Hybrid
Answers
C.
Community
C.
Community
Answers
D.
Private
D.
Private
Answers
Suggested answer: D

Explanation:

A private cloud model would best suit the company's priorities of control and security over cost and ease of management. In a private cloud, the infrastructure is dedicated to a single organization, providing greater control over the environment and the ability to implement strict security measures. This is in contrast to public, community, or hybrid cloud models, where resources are shared among multiple organizations, potentially compromising control and security. While private clouds can be more expensive and more difficult to manage, they the highest level of control and security for the company.

Reference:

- CompTIA Security+ Certification Exam Objectives (SY0-601), Section 3.2: "Explain the importance of secure staging deployment concepts."

- Cisco: Private Cloud - https://www.cisco.com/c/en/us/solutions/cloud/private-cloud.html

Which of the following should be addressed first on security devices before connecting to the network?

A.
Open permissions
A.
Open permissions
Answers
B.
Default settings
B.
Default settings
Answers
C.
API integration configuration
C.
API integration configuration
Answers
D.
Weak encryption
D.
Weak encryption
Answers
Suggested answer: B

Explanation:

Before connecting security devices to the network, it is crucial to address default settings first. Manufacturers often ship devices with default settings that include default usernames, passwords, and configurations. These settings are widely known and can be easily exploited by attackers. Changing default settings helps to secure the device and prevent unauthorized access. Reference:

CompTIA Security+ SY0-501 Exam Objectives, Section 3.2: "Given a scenario, implement secure systems design." (https://www.comptia.jp/pdf/Security%2B%20SY0- 501%20Exam%20Objectives.pdf)

A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the best way to secure a replacement computer and deter future theft?

A.
Installing proximity card readers on all entryway doors
A.
Installing proximity card readers on all entryway doors
Answers
B.
Deploying motion sensor cameras in the lobby
B.
Deploying motion sensor cameras in the lobby
Answers
C.
Encrypting the hard drive on the new desktop
C.
Encrypting the hard drive on the new desktop
Answers
D.
Using cable locks on the hardware
D.
Using cable locks on the hardware
Answers
Suggested answer: D

Explanation:

Using cable locks on the hardware can be an effective way to secure a desktop computer and deter future theft. Cable locks are physical security devices that attach to the computer case and to a nearby stationary object, such as a desk or wall. This makes it more difficult for a thief to remove the computer without damaging it or attracting attention.

Installing proximity card readers on all entryway doors can enhance physical security by limiting access to authorized individuals. Deploying motion sensor cameras in the lobby can also help deter theft by capturing images of any unauthorized individuals entering the premises or attempting to steal the computer. Encrypting the hard drive on the replacement desktop can also help protect sensitive data in the event of theft, but it does not provide physical security for the device itself.

Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?

A.
DLP
A.
DLP
Answers
B.
TLS
B.
TLS
Answers
C.
AV
C.
AV
Answers
D.
IDS
D.
IDS
Answers
Suggested answer: A

Explanation:

DLP stands for data loss prevention, which is a set of tools and processes that aim to prevent unauthorized access, use, or transfer of sensitive data. DLP can help mitigate the risk of data exfiltration by disgruntled employees or external attackers by monitoring and controlling data flows across endpoints, networks, and cloud services. DLP can also detect and block attempts to copy, transfer, or upload sensitive data to a USB drive or other removable media based on predefined policies and rules.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.microsoft.com/en-us/security/business/security-101/what-is-data-loss-prevention-dlp

Which of the following can be used to calculate the total loss expected per year due to a threat targeting an asset?

A.
EF x asset value
A.
EF x asset value
Answers
B.
ALE / SLE
B.
ALE / SLE
Answers
C.
MTBF x impact
C.
MTBF x impact
Answers
D.
SLE x ARO
D.
SLE x ARO
Answers
Suggested answer: D

Explanation:

The total loss expected per year due to a threat targeting an asset can be calculated using the Single Loss Expectancy (SLE) multiplied by the Annualized Rate of Occurrence (ARO). SLE is the monetary loss expected from a single event, while ARO is the estimated frequency of that event occurring in a year. Reference: CompTIA Security+ Study Guide: Exam SY0-501, 7th Edition, by Emmett Dulaney and Chuck Easttom, Chapter 9: Risk Management, page 414.

Total 603 questions
Go to page: of 61