CompTIA SY0-601 Practice Test - Questions Answers, Page 34
List of questions
Related questions
A security engineer learns that a non-critical application was compromised. The most recent version of the application includes a malicious reverse proxy while the application is running. Which of the following should the engineer is to quickly contain the incident with the least amount of impact?
Which of the following models offers third-party-hosted, on-demand computing resources that can be shared with multiple organizations over the internet?
Which of the following describes business units that purchase and implement scripting software without approval from an organization's technology Support staff?
A security operations technician is searching the log named /vax/messages for any events that were associated with a workstation with the IP address 10.1.1.1. Which of the following would provide this information?
A company was recently breached. Part of the company's new cybersecurity strategy is to centralize the logs from all security devices. Which of the following components forwards the logs to a central source?
An attacker is targeting a company. The attacker notices that the company’s employees frequently access a particular website. The attacker decides to infect the website with malware and hopes the employees’ devices will also become infected. Which of the following techniques is the attacker using?
While performing a threat-hunting exercise, a security analyst sees some unusual behavior occurring in an application when a user changes the display name. The security analyst decides to perform a static code analysis and receives the following pseudocode:
Which of the following attack types best describes the root cause of the unusual behavior?
A security team is providing input on the design of a secondary data center that has the following req uirements:+ Anatural disaster at the primary site should not affect the secondary site. The secondary site should have the capability for failover during traffic surge situations.+ The secondary site must m eet the same physical security requirements as the primary site. The secondary site must provide pro tection against power surges and outages.
Which of the following should the security team recommend? (Select two).
An account was disabled atter several failed and successful login connections were made from various parts of the Word at various times. A security analysts investigating the issue. Which of the following account policies most likely triggered the action to disable the
Which of the following should a Chief Information Security Officer consider using to take advantage of industry standard guidelines?
Question