ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A candidate attempts to go to but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following best describes this type of attack?

A.
Reconnaissance
A.
Reconnaissance
Answers
B.
Impersonation
B.
Impersonation
Answers
C.
Typosquatting
C.
Typosquatting
Answers
D.
Watering-hole
D.
Watering-hole
Answers
Suggested answer: C

Explanation:

Typosquatting is a type of cyberattack that involves registering domains with deliberately misspelled names of well-known websites. The attackers do this to lure unsuspecting visitors to alternative websites, typically for malicious purposes. Visitors may end up at these alternative websites by inadvertently mistyping the name of popular websites into their web browser or by being lured by a phishing scam. The attackers may emulate the look and feel of the legitimate websites and trick users into entering sensitive information or downloading malware.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.kaspersky.com/resource-center/definitions/what-is-typosquatting

A police department is using the cloud to share information city officials Which of the cloud models describes this scenario?

A.
Hybrid
A.
Hybrid
Answers
B.
private
B.
private
Answers
C.
pubic
C.
pubic
Answers
D.
Community
D.
Community
Answers
Suggested answer: D

Explanation:

A community cloud model describes a scenario where a cloud service is shared among multiple organizations that have common goals, interests, or requirements. A community cloud can be hosted by one of the organizations, a third-party provider, or a combination of both. A community cloud can offer benefits such as cost savings, security, compliance, and collaboration. A police department using the cloud to share information with city officials is an example of a community cloud model.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.ibm.com/cloud/learn/community-cloud

Which of the following allow access to remote computing resources, a operating system. and centrdized configuration and data

A.
Containers
A.
Containers
Answers
B.
Edge computing
B.
Edge computing
Answers
C.
Thin client
C.
Thin client
Answers
D.
Infrastructure as a service
D.
Infrastructure as a service
Answers
Suggested answer: C

Explanation:

Thin clients are devices that have minimal hardware and software components and rely on a remote server to provide access to computing resources, an operating system, and centralized configuration and data. Thin clients can reduce the cost, complexity, and security risks of managing multiple devices.

Which of the following security design features can an development team to analyze the deletion eoting Of data sets the copy?

A.
Stored procedures
A.
Stored procedures
Answers
B.
Code reuse
B.
Code reuse
Answers
C.
Version control
C.
Version control
Answers
D.
Continunus
D.
Continunus
Answers
Suggested answer: C

Explanation:

Version control is a solution that can help a development team to analyze the deletion or editing of data sets without affecting the original copy. Version control is a system that records changes to a file or set of files over time so that specific versions can be recalled later. Version control can help developers track and manage changes to code, data, or documents, as well as collaborate with other developers and resolve conflicts.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.atlassian.com/git/tutorials/what-is-version-control

A security analyst is reviewing packet capture data from a compromised host On the In the packet capture. analyst locates packets that contain large of text, Which Of following is most likely installed on compromised host?

A.
Keylogger
A.
Keylogger
Answers
B.
Spyware
B.
Spyware
Answers
C.
Torjan
C.
Torjan
Answers
D.
Ransomware
D.
Ransomware
Answers
Suggested answer: A

Explanation:

A keylogger is a type of malware that records the keystrokes of the user and sends them to a remote attacker. The attacker can use the keystrokes to steal the user’s credentials, personal information, or other sensitive data. A keylogger can generate packets that contain large amounts of text, as the packet capture data shows.

An employee's laptop was stolen last month. This morning, the was returned by the A cyberrsecurity analyst retrieved laptop and has since cybersecurity incident checklist Four incident handlers are responsible for executing the checklist. Which of the following best describes the process for evidence collection assurance?

A.
Time stamp
A.
Time stamp
Answers
B.
Chain of custody
B.
Chain of custody
Answers
C.
Admissibility
C.
Admissibility
Answers
D.
Legal hold
D.
Legal hold
Answers
Suggested answer: B

Explanation:

Chain of custody is a process that documents the chronological and logical sequence of custody, control, transfer, analysis, and disposition of materials, including physical or electronic evidence. Chain of custody is important to ensure the integrity and admissibility of evidence in legal proceedings. Chain of custody can help evidence collection assurance by providing proof that the evidence has been handled properly and has not been tampered with or contaminated.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.thoughtco.com/chain-of-custody-4589132

After installing a patch On a security appliance. an organization realized a massive data exfiltration occurred. Which Of the following describes the incident?

A.
Supply chain attack
A.
Supply chain attack
Answers
B.
Ransomware attack
B.
Ransomware attack
Answers
C.
Cryptographic attack
C.
Cryptographic attack
Answers
D.
Password attack
D.
Password attack
Answers
Suggested answer: A

Explanation:

A supply chain attack is a type of attack that involves compromising a trusted third-party provider or vendor and using their products or services to deliver malware or gain access to the target organization. The attacker can exploit the trust and dependency that the organization has on the provider or vendor and bypass their security controls. In this case, the attacker may have tampered with the patch for the security appliance and used it to exfiltrate data from the organization.

Which Of the following control types is patch management classified under?

A.
Deterrent
A.
Deterrent
Answers
B.
Physical
B.
Physical
Answers
C.
Corrective
C.
Corrective
Answers
D.
Detective
D.
Detective
Answers
Suggested answer: C

Explanation:

Patch management is a process that involves applying updates or fixes to software to address bugs, vulnerabilities, or performance issues. Patch management is classified under corrective control type, which is a type of control that aims to restore normal operations after an incident or event has occurred. Corrective controls can help mitigate the impact or damage caused by an incident or event and prevent it from happening again.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.csoonline.com/article/2124681/why-third-party-security-is-your-security.html

A company a "right to forgotten" request To legally comply, the company must remove data related to the requester from its systems. Which Of the following Company most likely complying with?

A.
NIST CSF
A.
NIST CSF
Answers
B.
GDPR
B.
GDPR
Answers
C.
PCI OSS
C.
PCI OSS
Answers
D.
ISO 27001
D.
ISO 27001
Answers
Suggested answer: B

Explanation:

GDPR stands for General Data Protection Regulation, which is a law that regulates data protection and privacy in the European Union (EU) and the European Economic Area (EEA). GDPR also applies to the transfer of personal data outside the EU and EEA areas. GDPR grants individuals the right to request the deletion or removal of their personal data from an organization’s systems under certain circumstances. This right is also known as the “right to be forgotten” or the “right to erasure”. An organization that receives such a request must comply with it within a specified time frame, unless there are legitimate grounds for retaining the data.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://gdpr- info.eu/issues/right-to-be-forgotten/

Which Of the following security controls can be used to prevent multiple from using a unique card swipe and being admitted to a entrance?

A.
Visitor logs
A.
Visitor logs
Answers
B.
Faraday cages
B.
Faraday cages
Answers
C.
Access control vestibules
C.
Access control vestibules
Answers
D.
Motion detection sensors
D.
Motion detection sensors
Answers
Suggested answer: C

Explanation:

Access control vestibules are physical security controls that consist of two sets of doors or gates that create a small enclosed space between them. Only one door or gate can be opened at a time, and only one person can enter or exit the vestibule at a time. Access control vestibules can prevent multiple people from using a unique card swipe and being admitted to a secure entrance, as they require each person to authenticate individually and prevent tailgating or piggybacking.

Total 603 questions
Go to page: of 61