ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 33

Add to Whishlist

List of questions

Question 321

Report Export Collapse

A company that provides an online streaming service made its customers' personal data including names and email addresses publicly available in a cloud storage service. As a result, the company experienced an increase m the number of requests to delete user accounts. Which of the following best describes the consequence of tins data disclosure?

Become a Premium Member for full access
  Unlock Premium Member

Question 322

Report Export Collapse

A cybersecurity analyst at Company A is working to establish a secure communication channel with a counter part at Company B, which is 3,000 miles (4.828 kilometers) away. Which of the following concepts would help the analyst meet this goal m a secure manner?

Become a Premium Member for full access
  Unlock Premium Member

Question 323

Report Export Collapse

The new Chief Information Security Officer at a company has asked the security learn to implement stronger user account policies. The new policies require:

β€’ Users to choose a password unique to their last ten passwords

β€’ Users to not log in from certain high-risk countries

Which of the following should the security team implement? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 324

Report Export Collapse

A Chief Information Security Officer (CISO) wants to implement a new solution that can protect against certain categories of websites, whether the employee is in the offer or away. Which of the following solutions should the CISO implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 325

Report Export Collapse

Which of the following is a security implication of newer 1CS devices that are becoming more common in corporations?

Become a Premium Member for full access
  Unlock Premium Member

Question 326

Report Export Collapse

A security investigation revealed mat malicious software was installed on a server using a server administrator credentials. During the investigation the server administrator explained that Telnet was regularly used to log in. Which of the blowing most likely occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 327

Report Export Collapse

A security administrator needs to provide secure access to internal networks for external partners The administrator has given the PSK and other parameters to the third-party security administrator. Which of the following is being used to establish this connection?

Become a Premium Member for full access
  Unlock Premium Member

Question 328

Report Export Collapse

An organization recently released a zero-trust policy that will enforce who is able to remotely access certain dat

Become a Premium Member for full access
  Unlock Premium Member

Question 329

Report Export Collapse

An attacker is using a method to hide data inside of benign files in order to exfiltrate confidential dat a. Which of the following is the attacker most likely using?

Become a Premium Member for full access
  Unlock Premium Member

Question 330

Report Export Collapse

An email security vendor recently added a retroactive alert after discovering a phishing email had already been delivered to an inbox. Which of the following would be the best way for the security administrator to address this type of alert in the future?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions