ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











A security administrator installed a new web server. The administrator did this to increase the capacity for an application due to resource exhaustion on another server. Which of the following algorithms should the administrator use to split the number of the connections on each server in half?

A.
Weighted response
A.
Weighted response
Answers
B.
Round-robin
B.
Round-robin
Answers
C.
Least connection
C.
Least connection
Answers
D.
Weighted least connection
D.
Weighted least connection
Answers
Suggested answer: B

Explanation:

Round-robin is a type of load balancing algorithm that distributes traffic to a list of servers in rotation. It is a static algorithm that does not take into account the state of the system for the distribution of tasks. It assumes that all servers have equal capacity and can handle an equal amount of traffic.

A financial institution recently joined a bug bounty program to identify security issues in the institution's new public platform. Which of the following best describes who the institution is working with to identify security issues?

A.
Script kiddie
A.
Script kiddie
Answers
B.
Insider threats
B.
Insider threats
Answers
C.
Malicious actor
C.
Malicious actor
Answers
D.
Authorized hacker
D.
Authorized hacker
Answers
Suggested answer: D

Explanation:

An authorized hacker, also known as an ethical hacker or a white hat hacker, is someone who uses their skills and knowledge to find and report security issues in a system or application with the permission of the owner. An authorized hacker follows the rules and guidelines of the bug bounty program and does not cause any harm or damage to the system or its users.

A company recently upgraded its authentication infrastructure and now has more computing power. Which of the following should the company consider using to ensure user credentials are being transmitted and stored more securely?

A.
Blockchain
A.
Blockchain
Answers
B.
Salting
B.
Salting
Answers
C.
Quantum
C.
Quantum
Answers
D.
Digital signature
D.
Digital signature
Answers
Suggested answer: B

Explanation:

Salting is a technique that adds random data to user credentials before hashing them. This makes the hashed credentials more secure and resistant to brute-force attacks or rainbow table attacks. Salting also ensures that two users with the same password will have different hashed credentials. A company that has more computing power can consider using salting to ensure user credentials are being transmitted and stored more securely. Salting can increase the complexity and entropy of the hashed credentials, making them harder to crack or reverse.

Which of the following social engineering attacks best describes an email that is primarily intended to mislead recipients into forwarding the email to others?

A.
Hoaxing
A.
Hoaxing
Answers
B.
Pharming
B.
Pharming
Answers
C.
Watering-hole
C.
Watering-hole
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: A

Explanation:

Hoaxing is a type of social engineering attack that involves sending false or misleading information via email or other means to trick recipients into believing something that is not true. Hoaxing emails often contain a request or an incentive for the recipients to forward the email to others, such as a warning of a virus, a promise of a reward, or a petition for a cause. The goal of hoaxing is to spread misinformation, cause panic, waste resources, or damage reputations. A hoaxing email is primarily intended to mislead recipients into forwarding the email to others, which can increase the reach and impact of the hoax.

A company is launching a website in a different country in order to capture user information that a marketing business can use. The company itself will not be using the information. Which of the following roles is the company assuming?

A.
Data owner
A.
Data owner
Answers
B.
Data processor
B.
Data processor
Answers
C.
Data steward
C.
Data steward
Answers
D.
Data collector
D.
Data collector
Answers
Suggested answer: D

Explanation:

A data collector is a person or entity that collects personal data from individuals for a specific purpose. A data collector may or may not be the same as the data controller or the data processor, depending on who determines the purpose and means of processing the data and who actually processes the data.

Multiple beaconing activities to a malicious domain have been observed. The malicious domain is hosting malware from various endpoints on the network. Which of the following technologies would be best to correlate the activities between the different endpoints?

A.
Firewall
A.
Firewall
Answers
B.
SIEM
B.
SIEM
Answers
C.
IPS
C.
IPS
Answers
D.
Protocol analyzer
D.
Protocol analyzer
Answers
Suggested answer: B

Explanation:

SIEM stands for Security Information and Event Management, which is a technology that collects, analyzes, and correlates data from multiple sources, such as firewall logs, IDS/IPS alerts, network devices, applications, and endpoints. SIEM provides real-time monitoring and alerting of security events, as well as historical analysis and reporting for compliance and forensic purposes. A SIEM technology would be best to correlate the activities between the different endpoints that are beaconing to a malicious domain. A SIEM can detect the malicious domain by comparing it with threat intelligence feeds or known indicators of compromise (IOCs). A SIEM can also identify the endpoints that are communicating with the malicious domain by analyzing the firewall logs and other network traffic data. A SIEM can alert the security team of the potential compromise and provide them with relevant information for investigation and remediation.

A security analyst reviews web server logs and notices the following line:

104.35. 45.53 -

[22/May/2020:07 : 00:58 +0100] "GET . UNION ALL SELECT

user login, user _ pass, user email from wp users—— HTTP/I.I" 200 1072 http://www.example.com/wordpress/wp—admin/

Which of the following vulnerabilities is the attacker trying to exploit?

A.
SSRF
A.
SSRF
Answers
B.
CSRF
B.
CSRF
Answers
C.
xss
C.
xss
Answers
D.
SQLi
D.
SQLi
Answers
Suggested answer: D

Explanation:

SQLi stands for SQL injection, which is a type of web security vulnerability that allows an attacker to execute malicious SQL statements on a database server. SQLi can result in data theft, data corruption, denial of service, or remote code execution.

The attacker in the web server log is trying to exploit a SQLi vulnerability by sending a malicious GET request that contains a UNION ALL SELECT statement. This statement is used to combine the results of two or more SELECT queries into a single result set. The attacker is attempting to retrieve user login, user pass, and user email from the wp users table, which is a WordPress database table that stores user information. The attacker may use this information to compromise the WordPress site or the users’ accounts.

A network-connected magnetic resonance imaging (MRI) scanner at a hospital is controlled and operated by an outdated and unsupported specialized Windows OS. Which of the following is most likely preventing the IT manager at the hospital from upgrading the specialized OS?

A.
The time needed for the MRI vendor to upgrade the system would negatively impact patients.
A.
The time needed for the MRI vendor to upgrade the system would negatively impact patients.
Answers
B.
The MRI vendor does not support newer versions of the OS.
B.
The MRI vendor does not support newer versions of the OS.
Answers
C.
Changing the OS breaches a support SLA with the MRI vendor.
C.
Changing the OS breaches a support SLA with the MRI vendor.
Answers
D.
The IT team does not have the budget required to upgrade the MRI scanner.
D.
The IT team does not have the budget required to upgrade the MRI scanner.
Answers
Suggested answer: B

Explanation:

This option is the most likely reason for preventing the IT manager at the hospital from upgrading the specialized OS. The MRI scanner is a complex and sensitive device that requires a specific OS to control and operate it. The MRI vendor may not have developed or tested newer versions of the OS for compatibility and functionality with the scanner. Upgrading the OS without the vendor’s support may cause the scanner to malfunction or stop working altogether.

An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?

A.
Application allow list
A.
Application allow list
Answers
B.
Load balancer
B.
Load balancer
Answers
C.
Host-based firewall
C.
Host-based firewall
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: C

Explanation:

A host-based firewall is a software application that runs on each individual host and controls the incoming and outgoing network traffic based on a set of rules. A host-based firewall can be used to block or allow specific ports, protocols, IP addresses, or applications. An engineer can use a host-based firewall to accomplish the task of disabling all web-server ports except 443 on a group of 100 web servers in a cloud environment. The engineer can configure the firewall rules on each web server to allow only HTTPS traffic on port 443 and deny any other traffic. Alternatively, the engineer can use a centralized management tool to deploy and enforce the firewall rules across all web servers.

A security operations center wants to implement a solution that can execute files to test for malicious activity. The solution should provide a report of the files' activity against known threats. Which of the following should the security operations center implement?

A.
theHarvester
A.
theHarvester
Answers
B.
Nessus
B.
Nessus
Answers
C.
Cuckoo
C.
Cuckoo
Answers
D.
Sn1per
D.
Sn1per
Answers
Suggested answer: C

Explanation:

Cuckoo is a sandbox that is specifically written to run programs inside and identify any malware. A sandbox is a virtualized environment that isolates the program from the rest of the system and monitors its behavior. Cuckoo can analyze files of various types, such as executables, documents, URLs, and more. Cuckoo can provide a report of the files’ activity against known threats, such as network traffic, file operations, registry changes, API calls, and so on. A security operations center can implement Cuckoo to execute files to test for malicious activity and generate a report of the analysis. Cuckoo can help the security operations center to detect and prevent malware infections, investigate incidents, and perform threat intelligence.

Total 603 questions
Go to page: of 61