ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 41

Add to Whishlist

List of questions

Question 401

Report Export Collapse

Which of the following terms should be included in a contract to help a company monitor the ongoing security maturity Of a new vendor?

Become a Premium Member for full access
  Unlock Premium Member

Question 402

Report Export Collapse

Which Of the following supplies non-repudiation during a forensics investiga-tion?

Become a Premium Member for full access
  Unlock Premium Member

Question 403

Report Export Collapse

Which Of the following best ensures minimal downtime for organizations vÄh critical computing equipment located in earthquake-prone areas?

Become a Premium Member for full access
  Unlock Premium Member

Question 404

Report Export Collapse

An audit identified Pll being utilized in the development environment of a crit-ical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed: however, the developers are concerned that without real data they cannot perform functionality tests and search for specific dat a. Which of the following should a security professional implement to best satisfy both the CPOs and the development team's requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 405

Report Export Collapse

A company has installed badge readers for building access but is finding unau-thorized individuals roaming the hallways Of the following is the most likely cause?

Become a Premium Member for full access
  Unlock Premium Member

Question 406

Report Export Collapse

An organization is repairing damage after an incident. Which Of the following controls is being implemented?

Become a Premium Member for full access
  Unlock Premium Member

Question 407

Report Export Collapse

A research company discovered that an unauthorized piece of software has been detected on a small number of machines in its lab The researchers collaborate with other machines using port 445 and on the internet using port 443 The unau-thorized software is starting to be seen on additional machines outside of the lab and is making outbound communications using HTTPS and SMS. The security team has been instructed to resolve the issue as quickly as possible while causing minimal disruption to the researchers. Which of the following is the best course Of action in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 408

Report Export Collapse

Which Of the following is a primary security concern for a setting up a BYOD program?

Become a Premium Member for full access
  Unlock Premium Member

Question 409

Report Export Collapse

A security analyst is taking part in an evaluation process that analyzes and categorizes threat actors Of real-world events in order to improve the incident response team's process. Which Of the following is the analyst most likely participating in?

Become a Premium Member for full access
  Unlock Premium Member

Question 410

Report Export Collapse

A company wants to build a new website to sell products online. The website wd I host a storefront application that allow visitors to add products to a shopping cart and pay for products using a credit card. which Of the following protocols •would be most secure to implement?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions