ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 27

Add to Whishlist

List of questions

Question 261

Report Export Collapse

A security administrator installed a new web server. The administrator did this to increase the capacity for an application due to resource exhaustion on another server. Which of the following algorithms should the administrator use to split the number of the connections on each server in half?

Become a Premium Member for full access
  Unlock Premium Member

Question 262

Report Export Collapse

A financial institution recently joined a bug bounty program to identify security issues in the institution's new public platform. Which of the following best describes who the institution is working with to identify security issues?

Become a Premium Member for full access
  Unlock Premium Member

Question 263

Report Export Collapse

A company recently upgraded its authentication infrastructure and now has more computing power. Which of the following should the company consider using to ensure user credentials are being transmitted and stored more securely?

Become a Premium Member for full access
  Unlock Premium Member

Question 264

Report Export Collapse

Which of the following social engineering attacks best describes an email that is primarily intended to mislead recipients into forwarding the email to others?

Become a Premium Member for full access
  Unlock Premium Member

Question 265

Report Export Collapse

A company is launching a website in a different country in order to capture user information that a marketing business can use. The company itself will not be using the information. Which of the following roles is the company assuming?

Become a Premium Member for full access
  Unlock Premium Member

Question 266

Report Export Collapse

Multiple beaconing activities to a malicious domain have been observed. The malicious domain is hosting malware from various endpoints on the network. Which of the following technologies would be best to correlate the activities between the different endpoints?

Become a Premium Member for full access
  Unlock Premium Member

Question 267

Report Export Collapse

A security analyst reviews web server logs and notices the following line:

104.35. 45.53 -

[22/May/2020:07 : 00:58 +0100] "GET . UNION ALL SELECT

user login, user _ pass, user email from wp usersβ€”β€” HTTP/I.I" 200 1072 http://www.example.com/wordpress/wpβ€”admin/

Which of the following vulnerabilities is the attacker trying to exploit?

Become a Premium Member for full access
  Unlock Premium Member

Question 268

Report Export Collapse

A network-connected magnetic resonance imaging (MRI) scanner at a hospital is controlled and operated by an outdated and unsupported specialized Windows OS. Which of the following is most likely preventing the IT manager at the hospital from upgrading the specialized OS?

Become a Premium Member for full access
  Unlock Premium Member

Question 269

Report Export Collapse

An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled. Which of the following can be used to accomplish this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 270

Report Export Collapse

A security operations center wants to implement a solution that can execute files to test for malicious activity. The solution should provide a report of the files' activity against known threats. Which of the following should the security operations center implement?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions