ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











An annual information security has revealed that several OS-level configurations are not in compliance due to Outdated hardening standards the company is using Which Of the following would be best to use to update and reconfigure the OS.level security configurations?

A.
CIS benchmarks
A.
CIS benchmarks
Answers
B.
GDPR guidance
B.
GDPR guidance
Answers
C.
Regional regulations
C.
Regional regulations
Answers
D.
ISO 27001 standards
D.
ISO 27001 standards
Answers
Suggested answer: A

Explanation:

CIS benchmarks are best practices and standards for securing various operating systems, applications, cloud environments, etc. They are developed by a community of experts and updated regularly to reflect the latest threats and vulnerabilities. They can be used to update and reconfigure the OS-level security configurations to ensure compliance and reduce risks

Which Of the following is the best method for ensuring non-repudiation?

A.
SSO
A.
SSO
Answers
B.
Digital certificate
B.
Digital certificate
Answers
C.
Token
C.
Token
Answers
D.
SSH key
D.
SSH key
Answers
Suggested answer: B

Explanation:

A digital certificate is an electronic document that contains the public key and identity information of an entity, such as a person, organization, website, etc. It is issued and signed by a trusted authority called a certificate authority (CA). It can provide non-repudiation by proving the identity and authenticity of the sender and verifying the integrity of the message or data.

A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

A.
Improper algorithms security
A.
Improper algorithms security
Answers
B.
Tainted training data
B.
Tainted training data
Answers
C.
virus
C.
virus
Answers
D.
Cryptomalware
D.
Cryptomalware
Answers
Suggested answer: B

Explanation:

Tainted training data is a type of data poisoning attack that involves modifying or injecting malicious data into the training dataset of a machine learning or artificial intelligence system. It can cause the system to learn incorrect or biased patterns and produce inaccurate or malicious outcomes. It is the most likely reason for the inaccuracy of the system that is using information collected from thirdparty providers that have been compromised by an attacker.

Which Of the following will provide the best physical security countermeasures to Stop intruders?

(Select two).

A.
Alarm
A.
Alarm
Answers
B.
Signage
B.
Signage
Answers
C.
Lighting
C.
Lighting
Answers
D.
Access control vestibules
D.
Access control vestibules
Answers
E.
Fencing
E.
Fencing
Answers
F.
Sensors
F.
Sensors
Answers
Suggested answer: C, E

Explanation:

Lighting and fencing are physical security countermeasures that can deter or stop intruders from accessing a facility or an asset. Lighting can increase visibility and reduce hiding spots for intruders, while fencing can create a physical barrier and limit access points for intruders.

Two organizations are discussing a possible merger Both Organizations Chief Fi-nancial Officers would like to safely share payroll data with each Other to de-termine if the pay scales for different roles are similar at both organizations Which Of the following techniques would be best to protect employee data while allowing the companies to successfully share this information?

A.
Pseudo-anonymization
A.
Pseudo-anonymization
Answers
B.
Tokenization
B.
Tokenization
Answers
C.
Data masking
C.
Data masking
Answers
D.
Encryption
D.
Encryption
Answers
Suggested answer: A

Explanation:

Pseudo-anonymization is a technique of replacing sensitive data with artificial identifiers or pseudonyms that preserve some characteristics or attributes of the original data. It can protect employee data while allowing the companies to successfully share this information by removing direct identifiers such as names, addresses, etc., but retaining indirect identifiers such as job roles, pay scales, etc., that are relevant for the comparison.

A company wants the ability to restrict web access and monitor the websites that employees visit, Which Of the following would best meet these requirements?

A.
Internet Proxy
A.
Internet Proxy
Answers
B.
VPN
B.
VPN
Answers
C.
WAF
C.
WAF
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: A

Explanation:

An internet proxy is a server that acts as an intermediary between a client and a destination server on the internet. It can restrict web access and monitor the websites that employees visit by filtering the requests and responses based on predefined rules and policies, and logging the traffic and activities for auditing purposes

Which Of the following vulnerabilities is exploited an attacker Overwrite a reg-ister with a malicious address that changes the execution path?

A.
VM escape
A.
VM escape
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
Buffer overflow
C.
Buffer overflow
Answers
D.
Race condition
D.
Race condition
Answers
Suggested answer: C

Explanation:

A buffer overflow is a type of vulnerability that occurs when an attacker sends more data than a buffer can hold, causing the excess data to overwrite adjacent memory locations such as registers. It can allow an attacker to overwrite a register with a malicious address that changes the execution path and executes arbitrary code on the target system

Which of the following automation use cases would best enhance the security posture Of an organization by rapidly updating permissions when employees leave a company Or change job roles internally?

A.
Provisioning resources
A.
Provisioning resources
Answers
B.
Disabling access
B.
Disabling access
Answers
C.
APIs
C.
APIs
Answers
D.
Escalating permission requests
D.
Escalating permission requests
Answers
Suggested answer: B

Explanation:

Disabling access is an automation use case that can enhance the security posture of an organization by rapidly updating permissions when employees leave a company or change job roles internally. It can prevent unauthorized access and data leakage by revoking or modifying the access rights of employees based on their current status and role.

A large retail store's network was breached recently. and this news was made public. The Store did not lose any intellectual property, and no customer information was stolen. Although no fines were incurred as a result, the Store lost revenue after the breach. Which of the following is the most likely reason for this issue?

A.
Employee training
A.
Employee training
Answers
B.
Leadership changes
B.
Leadership changes
Answers
C.
Reputation
C.
Reputation
Answers
D.
Identity theft
D.
Identity theft
Answers
Suggested answer: C

Explanation:

Reputation is the perception or opinion that customers, partners, investors, etc., have about a company or its products and services. It can affect the revenue and profitability of a company after a network breach, even if no intellectual property or customer information was stolen, because it can damage the trust and confidence of the stakeholders and reduce their willingness to do business with the company

A company's help desk has received calls about the wireless network being down and users being unable to connect to it The network administrator says all access points are up and running One of the help desk technicians notices the affected users are working in a building near the parking lot.

Which of the following is the most likely reason for the outage?

A.
Someone near the building is jamming the signal
A.
Someone near the building is jamming the signal
Answers
B.
A user has set up a rogue access point near the building
B.
A user has set up a rogue access point near the building
Answers
C.
Someone set up an evil twin access point in the affected area.
C.
Someone set up an evil twin access point in the affected area.
Answers
D.
The APs in the affected area have been unplugged from the network
D.
The APs in the affected area have been unplugged from the network
Answers
Suggested answer: A

Explanation:

Jamming is a type of denial-of-service attack that involves interfering with or blocking the wireless signal using a device that emits radio waves at the same frequency as the wireless network. It can cause the wireless network to be down and users to be unable to connect to it, especially if they are working in a building near the parking lot where someone could easily place a jamming device.

Total 603 questions
Go to page: of 61