ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











A building manager is concerned about people going in and out of the office during non-working hours. Which of the following physical security controls would provide the best solution?

A.
Cameras
A.
Cameras
Answers
B.
Badges
B.
Badges
Answers
C.
Locks
C.
Locks
Answers
D.
Bollards
D.
Bollards
Answers
Suggested answer: B

Explanation:

Badges are physical security controls that provide a way to identify and authenticate authorized individuals who need to access a building or a restricted area. Badges can also be used to track the entry and exit times of people and monitor their movements within the premises. Badges can help deter unauthorized access by requiring people to present a valid credential before entering or leaving the office. Badges can also help prevent tailgating, which is when an unauthorized person follows an authorized person through a door or gate. Badges can be integrated with other security

systems, such as locks, alarms, cameras, or biometrics, to enhance the level of protection.

A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the following entries:

Which of the following password attacks is taking place?

A.
Dictionary
A.
Dictionary
Answers
B.
Brute-force
B.
Brute-force
Answers
C.
Rainbow table
C.
Rainbow table
Answers
D.
Spraying
D.
Spraying
Answers
Suggested answer: D

Explanation:

Spraying is a password attack that involves trying a few common passwords against a large number of usernames. Spraying is different from brute-force attacks, which try many possible passwords against one username, or dictionary attacks, which try a list of words from a dictionary file against

one username. Spraying is often used when the web application has a lockout policy that prevents multiple failed login attempts for the same username. Spraying can be detected by looking for patterns of failed login attempts from the same source IP address with different usernames and the

same or similar passwords.

A network penetration tester has successfully gained access to a target machine. Which of the following should the penetration tester do next?

A.
Clear the log files of all evidence
A.
Clear the log files of all evidence
Answers
B.
Move laterally to another machine.
B.
Move laterally to another machine.
Answers
C.
Establish persistence for future use.
C.
Establish persistence for future use.
Answers
D.
Exploit a zero-day vulnerability.
D.
Exploit a zero-day vulnerability.
Answers
Suggested answer: C

Explanation:

Establishing persistence for future use is the next step that a network penetration tester should do after gaining access to a target machine. Persistence means creating a backdoor or a covert channel that allows the penetration tester to maintain access to the target machine even if the initial exploit is patched or the connection is lost. Persistence can be achieved by installing malware, creating hidden user accounts, modifying registry keys, or setting up remote access tools. Establishing persistence can help the penetration tester to perform further reconnaissance, move laterally to

other machines, or exfiltrate data from the target network.

A security analyst is currently addressing an active cyber incident. The analyst has been able to identify affected devices that are running a malicious application with a unique hash. Which of the following is the next step according to the incident response process?

A.
Recovery
A.
Recovery
Answers
B.
Lessons learned
B.
Lessons learned
Answers
C.
Containment
C.
Containment
Answers
D.
Preparation
D.
Preparation
Answers
Suggested answer: C

Explanation:

Containment is the next step according to the incident response process after identifying affected devices that are running a malicious application with a unique hash. Containment involves isolating the compromised devices or systems from the rest of the network to prevent the spread of the attack and limit its impact. Containment can be done by disconnecting the devices from the network, blocking network traffic to or from them, or applying firewall rules or access control lists. Containment is a critical step in incident response because it helps to preserve evidence for

further analysis and remediation, and reduces the risk of data loss or exfiltration

https://www.fortinet.com/resources/cyberglossary/incident-response

https://www.ibm.com/topics/incident-response

A web architect would like to move a company's website presence to the cloud. One of the management team's key concerns is resiliency in case a cloud provider's data center or network connection goes down. Which of the following should the web architect consider to address this

concern?

A.
Containers
A.
Containers
Answers
B.
Virtual private cloud
B.
Virtual private cloud
Answers
C.
Segmentation
C.
Segmentation
Answers
D.
Availability zones
D.
Availability zones
Answers
Suggested answer: D

Explanation:

Availability zones are the most appropriate cloud feature to address the concern of resiliency in case a cloud provider’s data center or network connection goes down. Availability zones are physically

separate locations within an Azure region that have independent power, cooling, and networking.

Each availability zone is made up of one or more data centers and houses infrastructure to support highly available, mission-critical applications. Availability zones are connected with high-speed,

private fiber-optic networks. Azure services that support availability zones fall into two categories:

Zonal services – you pin the resource to a specific zone (for example, virtual machines, managed disks, IP addresses), or Zone-redundant services – platform replicates automatically across zones (for

example, zone-redundant storage, SQL Database). To achieve comprehensive business continuity on Azure, build your application architecture using the combination of availability zones with Azure region pairs. You can synchronously replicate your applications and data using availability zones

within an Azure region for high-availability and asynchronously replicate across Azure regions for disaster recovery protection.

An organization has hired a security analyst to perform a penetration test The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?

A.
Nmap
A.
Nmap
Answers
B.
CURL
B.
CURL
Answers
C.
Neat
C.
Neat
Answers
D.
Wireshark
D.
Wireshark
Answers
Suggested answer: D

Explanation:

Wireshark is a tool that can analyze pcap files, which are files that capture network traffic. Wireshark can display the packets, protocols, and other details of the network traffic in a graphical user interface. Nmap is a tool that can scan networks and hosts for open ports and services. CURL is a tool that can transfer data from or to a server using various protocols. Neat is a tool that can test network performance and quality.

Which of the following roles is responsible for defining the protection type and Classification type for a given set of files?

A.
General counsel
A.
General counsel
Answers
B.
Data owner
B.
Data owner
Answers
C.
Risk manager
C.
Risk manager
Answers
D.
Chief Information Officer
D.
Chief Information Officer
Answers
Suggested answer: B

Explanation:

Data owner is the role that is responsible for defining the protection type and classification type for a given set of files. Data owner is a person in the organization who is accountable for a certain set of data and determines how it should be protected and classified. General counsel is the role that provides legal advice and guidance to the organization. Risk manager is the role that identifies, analyzes, and mitigates risks to the organization. Chief Information Officer is the role that oversees the information technology strategy and operations of the organization

https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/data-roles-andresponsibilities/

A systems administrator is required to enforce MFA for corporate email account access, relying on the possession factor. Which of the following authentication methods should the systems administrator choose? (Select two).

A.
passphrase
A.
passphrase
Answers
B.
Time-based one-time password
B.
Time-based one-time password
Answers
C.
Facial recognition
C.
Facial recognition
Answers
D.
Retina scan
D.
Retina scan
Answers
E.
Hardware token
E.
Hardware token
Answers
F.
Fingerprints
F.
Fingerprints
Answers
Suggested answer: B, E

Explanation:

Time-based one-time password (TOTP) and hardware token are authentication methods that rely on the possession factor, which means that the user must have a specific device or object in their possession to authenticate. A TOTP is a password that is valid for a short period of time and is generated by an app or a device that the user has. A hardware token is a physical device that displays a code or a password that the user can enter to authenticate. A passphrase (Option A) is a knowledge factor, while facial recognition (Option C), retina scan (Option D), and fingerprints (Option F) are all inherence factors.

https://ptgmedia.pearsoncmg.com/imprint_downloads/pearsonitcertification/bookreg/9780136798675/9780136798675_tearcard.pdf

https://www.youtube.com/watch?v=yCJyPPvM-xg

A company's help desk has received calls about the wireless network being down and users being unable to connect to it. The network administrator says all access pcints are up and running. One of the help desk technicians notices the affected users are working in a near the parking Jot Which Of the following IS the most likely reason for the outage?

A.
Someone near the is jamming the signal.
A.
Someone near the is jamming the signal.
Answers
B.
A user has set up a rogue access point near building.
B.
A user has set up a rogue access point near building.
Answers
C.
Someone set up an evil twin access Print in tie affected area.
C.
Someone set up an evil twin access Print in tie affected area.
Answers
D.
The APS in the affected area have been from the network
D.
The APS in the affected area have been from the network
Answers
Suggested answer: A

Explanation:

Wireless jamming is a way for an attacker to disrupt a wireless network and create a denial of service situation by decreasing the signal-to-noise ratio at the receiving device. The attacker would need to be relatively close to the wireless network to overwhelm the good signal. The other options are not likely to cause a wireless network outage for users near the parking lot.

Security analysts notice a server login from a user who has been on vacation for two weeks, The analysts confirm that the user did not log in to the system while on vacation After reviewing packet capture the analysts notice the following:

Which of the following occurred?

A.
A buffer overflow was exploited to gain unauthorized access.
A.
A buffer overflow was exploited to gain unauthorized access.
Answers
B.
The user's account was con-promised, and an attacker changed the login credentials.
B.
The user's account was con-promised, and an attacker changed the login credentials.
Answers
C.
An attacker used a pass-the-hash attack to gain access.
C.
An attacker used a pass-the-hash attack to gain access.
Answers
D.
An insider threat with username logged in to the account.
D.
An insider threat with username logged in to the account.
Answers
Suggested answer: C

Explanation:

A pass-the-hash attack is a type of replay attack that captures and uses the hash of a password. The attacker then attempts to log on as the user with the stolen hash. This type of attack is possible because some authentication protocols send hashes over the network instead of plain text passwords.

The packet capture shows that the attacker used NTLM authentication, which is vulnerable to passthe-hash attacks

Total 603 questions
Go to page: of 61