ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 43

Question list
Search
Search

List of questions

Search

Related questions











Which of the following types of controls is a turnstile?

A.
Physical
A.
Physical
Answers
B.
Detective
B.
Detective
Answers
C.
Corrective
C.
Corrective
Answers
D.
Technical
D.
Technical
Answers
Suggested answer: A

Explanation:

A turnstile is a physical security control that regulates the entry and exit of people into a facility or an area. It can prevent unauthorized access, tailgating, etc., by requiring valid credentials or tokens to pass through

Which of the following will increase cryptographic security?

A.
High data entropy
A.
High data entropy
Answers
B.
Algorithms that require less computing power
B.
Algorithms that require less computing power
Answers
C.
Longer key longevity
C.
Longer key longevity
Answers
D.
Hashing
D.
Hashing
Answers
Suggested answer: C

Explanation:


Which of the following cloud models provides clients with servers, storage, and networks but nothing else?

A.
SaaS
A.
SaaS
Answers
B.
PaaS
B.
PaaS
Answers
C.
laaS
C.
laaS
Answers
D.
DaaS
D.
DaaS
Answers
Suggested answer: C

Explanation:

laaS (Infrastructure as a Service) is a cloud model that provides clients with servers, storage, and networks but nothing else. It allows clients to have more control and flexibility over the configuration and management of their infrastructure resources, but also requires them to install and maintain their own operating systems, applications, etc.

A company is implementing MFA for all applications that store sensitive dat a. The IT manager wants MFA to be non-disruptive and user friendly Which of the following technologies should the IT manager use when implementing MFA?

A.
One-time passwords
A.
One-time passwords
Answers
B.
Email tokens
B.
Email tokens
Answers
C.
Push notifications
C.
Push notifications
Answers
D.
Hardware authentication
D.
Hardware authentication
Answers
Suggested answer: C

Explanation:

Push notifications are a type of technology that allows an application or a service to send messages or alerts to a user's device without requiring the user to open the application or the service. They can be used for multi-factor authentication (MFA) by sending a prompt or a code to the user's device that the user has to approve or enter to verify their identity. They can be non-disruptive and user friendly because they do not require the user to remember or type anything, and they can be delivered instantly and securely.

A security analyst is hardening a network infrastructure The analyst is given the following requirements

• Preserve the use of public IP addresses assigned to equipment on the core router

• Enable "in transport" encryption protection to the web server with the strongest ciphers.

Which of the following should the analyst implement to meet these requirements? (Select two).

A.
Configure VLANs on the core router
A.
Configure VLANs on the core router
Answers
B.
Configure NAT on the core router.
B.
Configure NAT on the core router.
Answers
C.
Configure BGP on the core router
C.
Configure BGP on the core router
Answers
D.
Enable AES encryption on the web server
D.
Enable AES encryption on the web server
Answers
E.
Enable 3DES encryption on the web server
E.
Enable 3DES encryption on the web server
Answers
F.
Enable TLSv2 encryption on the web server
F.
Enable TLSv2 encryption on the web server
Answers
Suggested answer: B, F

Explanation:

NAT (Network Address Translation) is a technique that allows a router to translate private IP addresses into public IP addresses and vice versa. It can preserve the use of public IP addresses assigned to equipment on the core router by allowing multiple devices to share a single public IP address. TLSv2 (Transport Layer Security version 2) is a cryptographic protocol that provides secure communication over the internet. It can enable "in transport" encryption protection to the web server with the strongest ciphers by encrypting the data transmitted between the web server and the clients using advanced algorithms and key exchange methods.

A network administrator has been alerted that web pages are experiencing long load times After determining it is not a routing or DNS issue the administrator logs in to the router, runs a command, and receives the following output:

CPU 0 percent busy, from 300 sec ago

1 sec ave: 99 percent busy

5 sec ave: 97 percent busy

1 min ave: 83 percent busy

Which of the following is The router experiencing?

A.
DDoS attack
A.
DDoS attack
Answers
B.
Memory leak
B.
Memory leak
Answers
C.
Buffer overflow
C.
Buffer overflow
Answers
D.
Resource exhaustion
D.
Resource exhaustion
Answers
Suggested answer: D

Explanation:

The router is experiencing a resource exhaustion issue. The output from the command indicates that the CPU is consistently busy, with a 1-second average of 99 percent busy and a 1-minute average of 83 percent busy. This indicates that the router is struggling to keep up with the demands placed on it, potentially due to a high volume of traffic or other factors. As a result, web pages are experiencing long load times. This is an example of resource exhaustion, where the router's resources are being overwhelmed and are unable to meet the demands placed on them. A DDoS attack, memory leak, or buffer overflow would not typically cause the symptoms described in the scenario.

A security analyst is concerned about traffic initiated to the dark web from the corporate LAN. Which of the following networks should the analyst monitor?

A.
SFTP
A.
SFTP
Answers
B.
AIS
B.
AIS
Answers
C.
Tor
C.
Tor
Answers
D.
loC
D.
loC
Answers
Suggested answer: C

Explanation:

Tor (The Onion Router) is a network and a software that enables anonymous communication over the internet. It routes the traffic through multiple relays and encrypts it at each layer, making it difficult to trace or monitor. It can access the dark web, which is a part of the internet that is hidden from conventional search engines and requires special software or configurations to access

During a security incident the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9 A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization's network. Which of the following fulfills this request?

A.
access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32
A.
access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32
Answers
B.
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
B.
access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0
Answers
C.
access-list inbound permit ip source 10.1.4.9/32 destination 0.0.0.0/0
C.
access-list inbound permit ip source 10.1.4.9/32 destination 0.0.0.0/0
Answers
D.
access-list inbound permit ip source 0.0.0.0/0 destination 10.1.4.9/32
D.
access-list inbound permit ip source 0.0.0.0/0 destination 10.1.4.9/32
Answers
Suggested answer: B

Explanation:

This command creates an inbound access list that denies any IP traffic from the source IP address of 10.1.4.9/32 to any destination IP address (0.0.0.0/0). It blocks the originating source of malicious traffic from accessing the organization's network.

To reduce and limit software and infrastructure costs the Chief Information Officer has requested to move email services to the cloud. The cloud provider and the organization must have secunty controls to protect sensitive data Which of the following cloud services would best accommodate the request?

A.
laaS
A.
laaS
Answers
B.
PaaS
B.
PaaS
Answers
C.
DaaS
C.
DaaS
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: D

Explanation:

SaaS (Software as a Service) is a cloud model that provides clients with applications and software that are hosted and managed by a cloud provider over the internet. It can move email services to the cloud by allowing clients to access and use email applications without installing or maintaining them on their own devices or servers

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would best support the policy?

A.
Mobile device management
A.
Mobile device management
Answers
B.
Full device encryption
B.
Full device encryption
Answers
C.
Remote wipe
C.
Remote wipe
Answers
D.
Biometrics
D.
Biometrics
Answers
Suggested answer: A

Explanation:

Mobile device management (MDM) is a solution that allows an organization to manage, monitor, and secure mobile devices that are used by employees for work purposes. It can protect company information on user devices by enforcing policies and controls such as encryption, password, remote wipe, etc., and detecting and preventing unauthorized access or data leakage.

Total 603 questions
Go to page: of 61