ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 39

Add to Whishlist

List of questions

Question 381

Report Export Collapse

A security administrator examines the ARP table of an access switch and sees the following output:

CompTIA SY0-601 image Question 372 98462 10022024175359000000

Which of the following is a potential threat that is occurring on this access switch?

Become a Premium Member for full access
  Unlock Premium Member

Question 382

Report Export Collapse

An engineer wants to inspect traffic to a cluster of web servers in a cloud environment Which of the following solutions should the engineer implement? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 383

Report Export Collapse

A backup operator wants to perform a backup to enhance the RTO and RPO in a highly time- and storage-efficient way that has no impact on production systems. Which of the following backup types should the operator use?

Become a Premium Member for full access
  Unlock Premium Member

Question 384

Report Export Collapse

A company is developing a new initiative to reduce insider threats. Which of the following should the company focus on to make the greatest impact?

Become a Premium Member for full access
  Unlock Premium Member

Question 385

Report Export Collapse

Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 386

Report Export Collapse

An organization decided not to put controls in place because of the high cost of implementing the controls compared to the cost of a potential fine. Which of the following risk management strategies is the organization following?

Become a Premium Member for full access
  Unlock Premium Member

Question 387

Report Export Collapse

Which of the following is the correct order of evidence from most to least volatile in forensic analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 388

Report Export Collapse

Which of the following is constantly scanned by internet bots and has the highest risk of attack in the case of the default configurations?

Become a Premium Member for full access
  Unlock Premium Member

Question 389

Report Export Collapse

A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avid managing a password for authentication and additional software installation. Which of the following should the architect recommend?

Become a Premium Member for full access
  Unlock Premium Member

Question 390

Report Export Collapse

Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure ac-cess is granted properly?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions