ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 34

Add to Whishlist

List of questions

Question 331

Report Export Collapse

A security engineer learns that a non-critical application was compromised. The most recent version of the application includes a malicious reverse proxy while the application is running. Which of the following should the engineer is to quickly contain the incident with the least amount of impact?

Become a Premium Member for full access
  Unlock Premium Member

Question 332

Report Export Collapse

Which of the following models offers third-party-hosted, on-demand computing resources that can be shared with multiple organizations over the internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 333

Report Export Collapse

Which of the following describes business units that purchase and implement scripting software without approval from an organization's technology Support staff?

Become a Premium Member for full access
  Unlock Premium Member

Question 334

Report Export Collapse

A security operations technician is searching the log named /vax/messages for any events that were associated with a workstation with the IP address 10.1.1.1. Which of the following would provide this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 335

Report Export Collapse

A company was recently breached. Part of the company's new cybersecurity strategy is to centralize the logs from all security devices. Which of the following components forwards the logs to a central source?

Become a Premium Member for full access
  Unlock Premium Member

Question 336

Report Export Collapse

An attacker is targeting a company. The attacker notices that the company’s employees frequently access a particular website. The attacker decides to infect the website with malware and hopes the employees’ devices will also become infected. Which of the following techniques is the attacker using?

Become a Premium Member for full access
  Unlock Premium Member

Question 337

Report Export Collapse

While performing a threat-hunting exercise, a security analyst sees some unusual behavior occurring in an application when a user changes the display name. The security analyst decides to perform a static code analysis and receives the following pseudocode:

CompTIA SY0-601 image Question 328 98418 10022024175359000000

Which of the following attack types best describes the root cause of the unusual behavior?

Become a Premium Member for full access
  Unlock Premium Member

Question 338

Report Export Collapse

A security team is providing input on the design of a secondary data center that has the following req uirements:+ Anatural disaster at the primary site should not affect the secondary site. The secondary site should have the capability for failover during traffic surge situations.+ The secondary site must m eet the same physical security requirements as the primary site. The secondary site must provide pro tection against power surges and outages.

Which of the following should the security team recommend? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 339

Report Export Collapse

An account was disabled atter several failed and successful login connections were made from various parts of the Word at various times. A security analysts investigating the issue. Which of the following account policies most likely triggered the action to disable the

Become a Premium Member for full access
  Unlock Premium Member

Question 340

Report Export Collapse

Which of the following should a Chief Information Security Officer consider using to take advantage of industry standard guidelines?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions