ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











An employee's company email is configured with conditional access and requires that MFA is enabled and used. An example of MFA is a phone call and:

A.
a push notification
A.
a push notification
Answers
B.
a password.
B.
a password.
Answers
C.
an SMS message.
C.
an SMS message.
Answers
D.
an authentication application.
D.
an authentication application.
Answers
Suggested answer: D

Explanation:

An authentication application can generate one-time passwords or QR codes that are time-based and unique to each user and device. It does not rely on network connectivity or SMS delivery, which can be intercepted or delayed. It also does not require the user to respond to a push notification, which can be accidentally approved or ignored.

Security engineers are working on digital certificate management with the top priority of making administration easier. Which of the following certificates is the best option?

A.
User
A.
User
Answers
B.
Wildcard
B.
Wildcard
Answers
C.
Self-signed
C.
Self-signed
Answers
D.
Root
D.
Root
Answers
Suggested answer: B

Explanation:

A wildcard certificate is a type of digital certificate that can be used to secure multiple subdomains under a single domain name. For example, a wildcard certificate for *.example.com can be used to secure www.example.com, mail.example.com, blog.example.com, etc. A wildcard certificate can make administration easier by reducing the number of certificates that need to be issued, managed, and renewed. It can also save costs and simplify configuration.

A company policy requires third-party suppliers to self-report data breaches within a specific time frame. Which of the following third-party risk management policies is the company complying with?

A.
MOU
A.
MOU
Answers
B.
SLA
B.
SLA
Answers
C.
EOL
C.
EOL
Answers
D.
NDA
D.
NDA
Answers
Suggested answer: B

Explanation:

An SLA or service level agreement is a type of third-party risk management policy that defines the expectations and obligations between a service provider and a customer. An SLA typically includes metrics and standards for measuring the quality and performance of the service, as well as penalties or remedies for non-compliance. An SLA can also specify the reporting requirements for data breaches or other incidents that may affect the customer’s security or privacy.

A security administrator is using UDP port 514 to send a syslog through an unsecure network to the SIEM server. Which of the following is the best way for the administrator to improve the process?

A.
Change the protocol to TCP.
A.
Change the protocol to TCP.
Answers
B.
Add LDAP authentication to the SIEM server.
B.
Add LDAP authentication to the SIEM server.
Answers
C.
Use a VPN from the internal server to the SIEM and enable DLP.
C.
Use a VPN from the internal server to the SIEM and enable DLP.
Answers
D.
Add SSL/TLS encryption and use a TCP 6514 port to send logs.
D.
Add SSL/TLS encryption and use a TCP 6514 port to send logs.
Answers
Suggested answer: D

Explanation:

SSL/TLS encryption is a method of securing the syslog traffic by using cryptographic protocols to encrypt and authenticate the data. SSL/TLS encryption can prevent eavesdropping, tampering, or spoofing of the syslog messages. TCP 6514 is the standard port for syslog over TLS, as defined by RFC 5425. Using this port can ensure compatibility and interoperability with other syslog implementations that support TLS.

A security engineer is investigating a penetration test report that states the company website is vulnerable to a web application attack. While checking the web logs from the time of the test, the engineer notices several invalid web form submissions using an unusual address: "SELECT * FROM customername”. Which of the following is most likely being attempted?

A.
Directory traversal
A.
Directory traversal
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
Privilege escalation
C.
Privilege escalation
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: B

Explanation:

SQL injection is a web application attack that involves inserting malicious SQL statements into an input field, such as a web form, to manipulate or access the database behind the application. SQL injection can be used to perform various actions, such as reading, modifying, or deleting data, executing commands on the database server, or bypassing authentication. In this scenario, the attacker is trying to use a SQL statement “SELECT * FROM customername” to retrieve all data from the customername table in the database.

A security analyst is investigating network issues between a workstation and a company server. The workstation and server occasionally experience service disruptions, and employees are forced to reconnect to the server. In addition, some reports indicate sensitive information is being leaked from the server to the public.

The workstation IP address is 192.168.1.103, and the server IP address is 192.168.1.101. The analyst runs arp -a On a separate workstation and obtains the following results:

Which of the following is most likely occurring?

A.
Evil twin attack
A.
Evil twin attack
Answers
B.
Domain hijacking attack
B.
Domain hijacking attack
Answers
C.
On-path attack
C.
On-path attack
Answers
D.
MAC flooding attack
D.
MAC flooding attack
Answers
Suggested answer: C

Explanation:

An on-path attack is a type of attack where an attacker places themselves between two devices (such as a workstation and a server) and intercepts or modifies the communications between them. An on- path attacker can collect sensitive information, impersonate either device, or disrupt the service. In this scenario, the attacker is likely using an on-path attack to capture and alter the network traffic between the workstation and the server, causing service disruptions and data leakage.

A Security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices, the following requirements must be met:

Mobile device OSs must be patched up to the latest release. A screen lock must be enabled (passcode or biometric).

Corporate data must be removed if the device is reported lost or stolen. Which of the following controls should the security engineer configure? (Select two).

A.
Disable firmware over-the-air
A.
Disable firmware over-the-air
Answers
B.
Storage segmentation
B.
Storage segmentation
Answers
C.
Posture checking
C.
Posture checking
Answers
D.
Remote wipe
D.
Remote wipe
Answers
E.
Full device encryption
E.
Full device encryption
Answers
F.
Geofencing
F.
Geofencing
Answers
Suggested answer: C, D

Explanation:

Posture checking and remote wipe are two controls that the security engineer should configure to comply with the corporate mobile device policy. Posture checking is a process that verifies if a mobile device meets certain security requirements before allowing it to access corporate resources. For example, posture checking can check if the device OS is patched up to the latest release and if a screen lock is enabled. Remote wipe is a feature that allows the administrator to erase all data from a mobile device remotely, in case it is lost or stolen. This can prevent unauthorized access to corporate data on the device.

A security analyst received the following requirements for the deployment of a security camera solution:

* The cameras must be viewable by the on-site security guards.

+ The cameras must be able to communicate with the video storage server.

* The cameras must have the time synchronized automatically. * The cameras must not be reachable directly via the internet.

* The servers for the cameras and video storage must be available for remote maintenance via the company VPN.

Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?

A.
Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on
A.
Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on
Answers
B.
Deploying a jump server that is accessible via the internal network that can communicate with the servers
B.
Deploying a jump server that is accessible via the internal network that can communicate with the servers
Answers
C.
Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering
C.
Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering
Answers
D.
Implementing a WAF to allow traffic from the local NTP server to the camera server
D.
Implementing a WAF to allow traffic from the local NTP server to the camera server
Answers
Suggested answer: B

Explanation:

A jump server is a system that is used to manage and access systems in a separate security zone. It acts as a bridge between two different security zones and provides a controlled and secure way of accessing systems between them12. A jump server can also be used for auditing traffic and user activity for real-time surveillance3. By deploying a jump server that is accessible via the internal network, the security analyst can securely meet the remote connectivity requirements for the servers and cameras without exposing them directly to the internet or allowing outgoing traffic from their subnet. The other options are not suitable because:

A. Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on would not allow remote maintenance via the company VPN.

C. Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering would not prevent direct internet access to the cameras or servers.

D. Implementing a WAF to allow traffic from the local NTP server to the camera server would not address the remote connectivity requirements or protect the servers from internet access.

Reference:

1: https://www.thesecuritybuddy.com/network-security/what-is-a-jump-server/ 3:

https://www.ssh.com/academy/iam/jump-server 2: https://en.wikipedia.org/wiki/Jump_server

Several users have been violating corporate security policy by accessing inappropriate Sites on corporate-issued mobile devices while off campus. The senior leadership team wants all mobile devices to be hardened with controls that:

Limit the sites that can be accessed

Only allow access to internal resources while physically on campus.

Restrict employees from downloading images from company email Whip of the following controls would best address this situation? (Select two).

A.
MFA
A.
MFA
Answers
B.
GPS tagging
B.
GPS tagging
Answers
C.
Biometric authentication
C.
Biometric authentication
Answers
D.
Content management
D.
Content management
Answers
E.
Geofencing
E.
Geofencing
Answers
F.
Screen lock and PIN requirements
F.
Screen lock and PIN requirements
Answers
Suggested answer: D, E

Explanation:

Content management is a security control that can limit the sites that can be accessed by corporate- issued mobile devices. It can also restrict employees from downloading images from company email by filtering or blocking certain types of content1. Geofencing is a security control that can only allow access to internal resources while physically on campus. It can use GPS or other location services to define a virtual boundary around a physical area and enforce policies based on the device’s location2.

Reference:

1: https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and- systems/system-hardening-and-administration/web-hardening/securing-content-management- systems 2: https://www.makeuseof.com/how-to-secure-your-content-management-system/

A security team is conducting a security review of a hosted data provider. The management team has asked the hosted data provider to share proof that customer data is being appropriately protected. Which of the following would provide the best proof that customer data is being protected?

A.
SOC2
A.
SOC2
Answers
B.
CSA
B.
CSA
Answers
C.
CSF
C.
CSF
Answers
D.
1SO 31000
D.
1SO 31000
Answers
Suggested answer: A

Explanation:

SOC2 is a type of audit report that provides assurance on the security, availability, processing integrity, confidentiality, and privacy of a service organization’s systems. It is based on the Trust Services Criteria developed by the American Institute of Certified Public Accountants (AICPA). A SOC2 report can provide proof that customer data is being appropriately protected by the hosted data provider1

https://www.csagroup.org/store/product/50072454/ 3:

https://www.csagroup.org/store/product/50072454os/ 1:

https://cloudsecurityalliance.org/blog/2021/08/20/star-testimonial-csa-star-soc2-from-readiness-to- attestation/

Total 603 questions
Go to page: of 61