ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











A security administrator examines the ARP table of an access switch and sees the following output:

Which of the following is a potential threat that is occurring on this access switch?

A.
DDoSonFa02 port
A.
DDoSonFa02 port
Answers
B.
MAG flooding on Fa0/2 port
B.
MAG flooding on Fa0/2 port
Answers
C.
ARP poisoning on Fa0/1 port
C.
ARP poisoning on Fa0/1 port
Answers
D.
DNS poisoning on port Fa0/1
D.
DNS poisoning on port Fa0/1
Answers
Suggested answer: C

An engineer wants to inspect traffic to a cluster of web servers in a cloud environment Which of the following solutions should the engineer implement? (Select two).

A.
CASB
A.
CASB
Answers
B.
WAF
B.
WAF
Answers
C.
Load balancer
C.
Load balancer
Answers
D.
VPN
D.
VPN
Answers
E.
TLS
E.
TLS
Answers
F.
DAST
F.
DAST
Answers
Suggested answer: B, C

Explanation:

A web application firewall (WAF) is a solution that inspects traffic to a cluster of web servers in a cloud environment and protects them from common web-based attacks, such as SQL injection, crosssite

scripting, and denial-of-service1. A WAF can be deployed as a cloud service or as a virtual appliance in front of the web servers. A load balancer is a solution that distributes traffic among multiple web servers in a cloud environment and improves their performance, availability, and

scalability2. A load balancer can also perform health checks on the web servers and route traffic only to the healthy ones. The other options are not relevant to this scenario. A CASB is a cloud access

security broker, which is a solution that monitors and controls the use of cloud services by an

organization’s users3. A VPN is a virtual private network, which is a solution that creates a secure and

encrypted connection between two networks or devices over the internet. TLS is Transport Layer

Security, which is a protocol that provides encryption and authentication for data transmitted over a

network. DAST is dynamic application security testing, which is a method of testing web applications

for vulnerabilities by simulating attacks on them.

Reference: 1: https://www.imperva.com/learn/application-security/what-is-a-web-applicationfirewall-waf/ 2:

https://www.imperva.com/learn/application-security/load-balancing/ 3:

https://www.imperva.com/learn/application-security/cloud-access-security-broker-casb/ :

https://www.imperva.com/learn/application-security/vpn-virtual-private-network/ :

https://www.imperva.com/learn/application-security/transport-layer-security-tls/ :

https://www.imperva.com/learn/application-security/dynamic-application-security-testing-dast/ :

https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-bestpractices/plan-for-traffic-inspection

: https://docs.microsoft.com/en-us/azure/private-link/inspecttraffic-with-azure-firewall

: https://docs.microsoft.com/en-us/azure/architecture/examplescenario/gateway/application-gateway-before-azure-firewall

A backup operator wants to perform a backup to enhance the RTO and RPO in a highly time- and storage-efficient way that has no impact on production systems. Which of the following backup types should the operator use?

A.
Tape
A.
Tape
Answers
B.
Full
B.
Full
Answers
C.
Image
C.
Image
Answers
D.
Snapshot
D.
Snapshot
Answers
Suggested answer: D

Explanation:

A snapshot backup is a type of backup that captures the state of a system at a point in time. It is highly time- and storage-efficient because it only records the changes made to the system since the last backup. It also has no impact on production systems because it does not require them to be

offline or paused during the backup process. Reference: https://www.comptia.org/blog/what-is-asnapshot-backup

A company is developing a new initiative to reduce insider threats. Which of the following should the company focus on to make the greatest impact?

A.
Social media analysis
A.
Social media analysis
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Nondisclosure agreements
C.
Nondisclosure agreements
Answers
D.
Mandatory vacation
D.
Mandatory vacation
Answers
Suggested answer: B

Explanation:

Least privilege is a security principle that states that users and processes should only have the minimum level of access and permissions required to perform their tasks. This reduces the risk of insider threats by limiting the potential damage that a malicious or compromised user or process can

cause to the system or data. Reference: https://www.comptia.org/blog/what-is-least-privilege

Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?

A.
Web metadata
A.
Web metadata
Answers
B.
Bandwidth monitors
B.
Bandwidth monitors
Answers
C.
System files
C.
System files
Answers
D.
Correlation dashboards
D.
Correlation dashboards
Answers
Suggested answer: D

Explanation:

Correlation dashboards are tools that allow security analysts to monitor and analyze multiple sources of data and events in real time. They can help identify patterns, trends, anomalies, and threats by correlating different types of data and events, such as network traffic, logs, alerts, and incidents.

Correlation dashboards can help investigate network flooding by showing the source, destination, volume, and type of malicious packets and their impact on the network performance and availability.

Reference: https://www.comptia.org/blog/what-is-a-correlation-dashboard

An organization decided not to put controls in place because of the high cost of implementing the controls compared to the cost of a potential fine. Which of the following risk management strategies is the organization following?

A.
Transference
A.
Transference
Answers
B.
Avoidance
B.
Avoidance
Answers
C.
Mitigation
C.
Mitigation
Answers
D.
Acceptance
D.
Acceptance
Answers
Suggested answer: D

Explanation:

Acceptance is a risk management strategy that involves acknowledging the existence and potential impact of a risk, but deciding not to take any action to reduce or eliminate it. This strategy is usually adopted when the cost of implementing controls outweighs the benefit of mitigating the risk, or when the risk is deemed acceptable or unavoidable. In this case, the organization decided not to put controls in place because of the high cost compared to the potential fine, which means they accepted the risk. Reference: https://www.comptia.org/blog/what-is-risk-acceptance

Which of the following is the correct order of evidence from most to least volatile in forensic analysis?

A.
Memory, disk, temporary filesystems, CPU cache
A.
Memory, disk, temporary filesystems, CPU cache
Answers
B.
CPU cache, memory, disk, temporary filesystems
B.
CPU cache, memory, disk, temporary filesystems
Answers
C.
CPU cache, memory, temporary filesystems, disk
C.
CPU cache, memory, temporary filesystems, disk
Answers
D.
CPU cache, temporary filesystems, memory, disk
D.
CPU cache, temporary filesystems, memory, disk
Answers
Suggested answer: C

Explanation:

The correct order of evidence from most to least volatile in forensic analysis is based on how quickly the evidence can be lost or altered if not collected or preserved properly. CPU cache is the most volatile type of evidence because it is stored in a small amount of memory on the processor and can be overwritten or erased very quickly. Memory is the next most volatile type of evidence because it is stored in RAM and can be lost when the system is powered off or rebooted. Temporary filesystems are less volatile than memory because they are stored on disk, but they can still be deleted or overwritten by other processes or users. Disk is the least volatile type of evidence because it is stored on permanent storage devices and can be recovered even after deletion or formatting, unless overwritten by new data. Reference: https://www.comptia.org/blog/what-is-volatility-in-digitalforensics

Which of the following is constantly scanned by internet bots and has the highest risk of attack in the case of the default configurations?

A.
Wearable sensors
A.
Wearable sensors
Answers
B.
Raspberry Pi
B.
Raspberry Pi
Answers
C.
Surveillance systems
C.
Surveillance systems
Answers
D.
Real-time operating systems
D.
Real-time operating systems
Answers
Suggested answer: C

Explanation:

Surveillance systems are constantly scanned by internet bots and have the highest risk of attack in the case of the default configurations because they are often connected to the internet and use weak or default passwords that can be easily guessed or cracked by malicious bots. Internet bots are

software applications that run automated tasks over the internet, usually with the intent to imitate human activity or exploit vulnerabilities. Some bots are used for legitimate purposes, such as web crawling or indexing, but others are used for malicious purposes, such as spamming, phishing,

denial-of-service attacks, or credential stuffing. Security misconfigurations are one of the most common gaps that criminal hackers look to exploit. Therefore, it is important to secure the configuration of surveillance systems by changing the default passwords, updating the firmware,

disabling unnecessary services, and enabling encryption and authentication.

https://www.cctvcameraworld.com/setup-ip-camera-system-on-network/

A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avid managing a password for authentication and additional software installation. Which of the following should the architect recommend?

A.
Soft token
A.
Soft token
Answers
B.
Smart card
B.
Smart card
Answers
C.
CSR
C.
CSR
Answers
D.
SSH key
D.
SSH key
Answers
Suggested answer: D

Explanation:

SSH key is a pair of cryptographic keys that can be used for authentication and encryption when connecting to a remote Linux server via SSH protocol. SSH key authentication does not require a password and is more secure than password-based authentication. SSH key authentication also does

not require additional software installation on the client or the server, as SSH is a built-in feature of most Linux distributions. A business partner can generate an SSH key pair on their own computer and send the public key to the company, who can then add it to the authorized_keys file on the Linux

server. This way, the business partner can access the Linux server without entering a password or installing any software

Cloud security engineers are planning to allow and deny access to specific features in order to increase data security. Which of the following cloud features is the most appropriate to ensure ac-cess is granted properly?

A.
API integrations
A.
API integrations
Answers
B.
Auditing
B.
Auditing
Answers
C.
Resource policies
C.
Resource policies
Answers
D.
Virtual networks
D.
Virtual networks
Answers
Suggested answer: C

Explanation:

Resource policies are cloud features that allow and deny access to specific features in order to increase data security. Resource policies are rules or statements that define what actions can be performed on a particular resource by which entities under what conditions. Resource policies can

be attached to cloud resources such as virtual machines, storage accounts, databases, or functions.

Resource policies can help enforce security best practices, compliance requirements, and cost management. Resource policies can also help implement the principle of least privilege, which grants users only the minimum level of access they need to perform their tasks.

Total 603 questions
Go to page: of 61