CompTIA SY0-601 Practice Test - Questions Answers, Page 39

List of questions
Question 381

A security administrator examines the ARP table of an access switch and sees the following output:
Which of the following is a potential threat that is occurring on this access switch?
Question 382

An engineer wants to inspect traffic to a cluster of web servers in a cloud environment Which of the following solutions should the engineer implement? (Select two).
Question 383

A backup operator wants to perform a backup to enhance the RTO and RPO in a highly time- and storage-efficient way that has no impact on production systems. Which of the following backup types should the operator use?
Question 384

A company is developing a new initiative to reduce insider threats. Which of the following should the company focus on to make the greatest impact?
Question 385

Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?
Question 386

An organization decided not to put controls in place because of the high cost of implementing the controls compared to the cost of a potential fine. Which of the following risk management strategies is the organization following?
Question 387

Which of the following is the correct order of evidence from most to least volatile in forensic analysis?
Question 388

Which of the following is constantly scanned by internet bots and has the highest risk of attack in the case of the default configurations?
Question 389

A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avid managing a password for authentication and additional software installation. Which of the following should the architect recommend?
Question 390

Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure ac-cess is granted properly?
Question