ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 40

Add to Whishlist

List of questions

Question 391

Report Export Collapse

A building manager is concerned about people going in and out of the office during non-working hours. Which of the following physical security controls would provide the best solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the following entries:

CompTIA SY0-601 image Question 383 98473 10022024175359000000

Which of the following password attacks is taking place?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

A network penetration tester has successfully gained access to a target machine. Which of the following should the penetration tester do next?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

A security analyst is currently addressing an active cyber incident. The analyst has been able to identify affected devices that are running a malicious application with a unique hash. Which of the following is the next step according to the incident response process?

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

A web architect would like to move a company's website presence to the cloud. One of the management team's key concerns is resiliency in case a cloud provider's data center or network connection goes down. Which of the following should the web architect consider to address this

concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

An organization has hired a security analyst to perform a penetration test The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

Which of the following roles is responsible for defining the protection type and Classification type for a given set of files?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

A systems administrator is required to enforce MFA for corporate email account access, relying on the possession factor. Which of the following authentication methods should the systems administrator choose? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

A company's help desk has received calls about the wireless network being down and users being unable to connect to it. The network administrator says all access pcints are up and running. One of the help desk technicians notices the affected users are working in a near the parking Jot Which Of the following IS the most likely reason for the outage?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

Security analysts notice a server login from a user who has been on vacation for two weeks, The analysts confirm that the user did not log in to the system while on vacation After reviewing packet capture the analysts notice the following:

Which of the following occurred?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions