ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 29

Add to Whishlist

List of questions

Question 281

Report Export Collapse

Users report access to an application from an internal workstation is still unavailable to a specific server, even after a recent firewall rule implementation that was requested for this access. ICMP traffic is successful between the two devices. Which of the following tools should the security analyst use to help identify if the traffic is being blocked?

Become a Premium Member for full access
  Unlock Premium Member

Question 282

Report Export Collapse

Which of the following incident response phases should the proper collection of the detected 'ocs and establishment of a chain of custody be performed before?

Become a Premium Member for full access
  Unlock Premium Member

Question 283

Report Export Collapse

Which of the following measures the average time that equipment will operate before it breaks?

Become a Premium Member for full access
  Unlock Premium Member

Question 284

Report Export Collapse

A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the companVs mobile application. After reviewing the back-end server logs, the security analyst finds the following entries

CompTIA SY0-601 image Question 275 98365 10022024175359000000

Which of the following is the most likely cause of the security control bypass?

Become a Premium Member for full access
  Unlock Premium Member

Question 285

Report Export Collapse

A company recently enhanced mobile device configuration by implementing a set of security controls: biometrics, context-aware authentication, and full device encryption. Even with these settings in place, an unattended phone was used by a malicious actor to access corporate data. Which of the following additional controls should be put in place first?

Become a Premium Member for full access
  Unlock Premium Member

Question 286

Report Export Collapse

A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.

CompTIA SY0-601 image Question 277 98367 10022024175359000000

INSTRUCTIONS

Click on each firewall to do the following:

Become a Premium Member for full access
  Unlock Premium Member

Question 287

Report Export Collapse

A software developer used open-source libraries to streamline development. Which of the following is the greatest risk when using this approach?

Become a Premium Member for full access
  Unlock Premium Member

Question 288

Report Export Collapse

An organization wants to quickly assess how effectively the IT team hardened new laptops Which of the following would be the best solution to perform this assessment?

Become a Premium Member for full access
  Unlock Premium Member

Question 289

Report Export Collapse

A network engineer receives a call regarding multiple LAN-connected devices that are on the same switch. The devices have suddenly been experiencing speed and latency issues while connecting to network resources. The engineer enters the command show mac address-table and reviews the following output

CompTIA SY0-601 image Question 280 98370 10022024175359000000

Which of the following best describes the attack that is currently in progress?

Become a Premium Member for full access
  Unlock Premium Member

Question 290

Report Export Collapse

Which of the following can be used to detect a hacker who is stealing company data over port 80?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions