ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 36

Add to Whishlist

List of questions

Question 351

Report Export Collapse

An organization wants to secure a LAN/WLAN so users can authenticate and transport data securely. The solution needs to prevent on-path attacks and evil twin attacks. Which of the following will best meet the organization's need?

Become a Premium Member for full access
  Unlock Premium Member

Question 352

Report Export Collapse

An organization recently completed a security control assessment The organization determined some controls did not meet the existing security measures. Additional mitigations are needed to lessen the risk of the non-complaint controls. Which of the following best describes these mitigations?

Become a Premium Member for full access
  Unlock Premium Member

Question 353

Report Export Collapse

A contractor overhears a customer recite their credit card number during a confidential phone call. The credit card Information is later used for a fraudulent transaction. Which of the following social engineering techniques describes this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 354

Report Export Collapse

An analyst is working on an investigation with multiple alerts for multiple hosts. The hosts are showing signs of being compromised by a fast-spreading worm. Which of the following should be the next step in order to stop the spread?

Become a Premium Member for full access
  Unlock Premium Member

Question 355

Report Export Collapse

Which of the following best describes a tool used by an organization to identi-fy, log, and track any potential risks and corresponding risk information?

Become a Premium Member for full access
  Unlock Premium Member

Question 356

Report Export Collapse

An air traffic controller receives a change in flight plan for an morning aircraft over the phone. The air traffic controller compares the change to what appears on radar and determines the information to be false. As a result, the air traffic controller is able to prevent an incident from occurring. Which of the following is this scenario an example of?

Become a Premium Member for full access
  Unlock Premium Member

Question 357

Report Export Collapse

A company has numerous employees who store PHI data locally on devices. The Chief Information Officer wants to implement a solution to reduce external exposure of PHI but not affect the business. The first step the IT team should perform is to deploy a DLP solution:

Become a Premium Member for full access
  Unlock Premium Member

Question 358

Report Export Collapse

A security analyst needs to recommend a solution that will allow current Active Directory accounts and groups to be used for access controls on both network and remote-access devices. Which of the following should the analyst recommend? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 359

Report Export Collapse

A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the company’s mobile application. After reviewing the back-end server logs, the security analyst finds the following entries:

CompTIA SY0-601 image Question 350 98440 10022024175359000000

Which of the following is the most likely cause of the security control bypass?

Become a Premium Member for full access
  Unlock Premium Member

Question 360

Report Export Collapse

A security analyst is assisting a team of developers with best practices for coding. The security analyst would like to defend against the use of SQL injection attacks. Which of the following should the security analyst recommend first?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions