CompTIA SY0-601 Practice Test - Questions Answers, Page 34

List of questions
Question 331

A security engineer learns that a non-critical application was compromised. The most recent version of the application includes a malicious reverse proxy while the application is running. Which of the following should the engineer is to quickly contain the incident with the least amount of impact?
Question 332

Which of the following models offers third-party-hosted, on-demand computing resources that can be shared with multiple organizations over the internet?
Question 333

Which of the following describes business units that purchase and implement scripting software without approval from an organization's technology Support staff?
Question 334

A security operations technician is searching the log named /vax/messages for any events that were associated with a workstation with the IP address 10.1.1.1. Which of the following would provide this information?
Question 335

A company was recently breached. Part of the company's new cybersecurity strategy is to centralize the logs from all security devices. Which of the following components forwards the logs to a central source?
Question 336

An attacker is targeting a company. The attacker notices that the companyβs employees frequently access a particular website. The attacker decides to infect the website with malware and hopes the employeesβ devices will also become infected. Which of the following techniques is the attacker using?
Question 337

While performing a threat-hunting exercise, a security analyst sees some unusual behavior occurring in an application when a user changes the display name. The security analyst decides to perform a static code analysis and receives the following pseudocode:
Which of the following attack types best describes the root cause of the unusual behavior?
Question 338

A security team is providing input on the design of a secondary data center that has the following req uirements:+ Anatural disaster at the primary site should not affect the secondary site. The secondary site should have the capability for failover during traffic surge situations.+ The secondary site must m eet the same physical security requirements as the primary site. The secondary site must provide pro tection against power surges and outages.
Which of the following should the security team recommend? (Select two).
Question 339

An account was disabled atter several failed and successful login connections were made from various parts of the Word at various times. A security analysts investigating the issue. Which of the following account policies most likely triggered the action to disable the
Question 340

Which of the following should a Chief Information Security Officer consider using to take advantage of industry standard guidelines?
Question