ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











A security analyst receives an alert from the company's S1EM that anomalous activity is coming from a local source IP address of 192 168 34.26 The Chief Information Security Officer asks the analyst to block the originating source Several days later another employee opens an internal ticket stating that vulnerability scans are no longer being performed property. The IP address the employee provides is 192 168.34 26. Which of the following describes this type of alert?

A.
True positive
A.
True positive
Answers
B.
True negative
B.
True negative
Answers
C.
False positive
C.
False positive
Answers
D.
False negative
D.
False negative
Answers
Suggested answer: C

Explanation:

A false positive is a type of alert that indicates a security incident when there is none. It can be caused by misconfigured or overly sensitive security tools or systems that generate false or irrelevant alerts. In this case, the alert from the company's SIEM that Mimikatz attempted to run on the remote systems was a false positive because it was triggered by a legitimate vulnerability scanning tool that uses Mimikatz as part of its functionality.

Law enforcement officials sent a company a notification that states electronically stored information and paper documents cannot be destroyed. Which of the following explains this process?

A.
Data breach notification
A.
Data breach notification
Answers
B.
Accountability
B.
Accountability
Answers
C.
Legal hold
C.
Legal hold
Answers
D.
Chain of custody
D.
Chain of custody
Answers
Suggested answer: C

Explanation:

A legal hold is a process that requires an organization to preserve electronically stored information and paper documents that are relevant to a pending or anticipated litigation or investigation. It suspends the normal retention and destruction policies and procedures for such information and documents until the legal hold is lifted or released.

Which of the following is a primary security concern for a company setting up a BYOD program?

A.
End of life
A.
End of life
Answers
B.
Buffer overflow
B.
Buffer overflow
Answers
C.
VM escape
C.
VM escape
Answers
D.
Jailbreaking
D.
Jailbreaking
Answers
Suggested answer: D

Explanation:

Jailbreaking is a process of bypassing or removing the manufacturer-imposed restrictions on a mobile device's operating system, allowing users to install unauthorized applications, modify settings, etc. It is a primary security concern for setting up a BYOD program because it can expose the device and its data to malware, vulnerabilities, unauthorized access, etc.

An information security officer at a credit card transaction company is conducting a frameworkmapping exercise with the internal controls. The company recently established a new office in Europe. To which of the following frameworks should the security officer map the existing controls' (Select two).

A.
ISO
A.
ISO
Answers
B.
PCI DSS
B.
PCI DSS
Answers
C.
SOC
C.
SOC
Answers
D.
GDPR
D.
GDPR
Answers
E.
CSA
E.
CSA
Answers
F.
NIST
F.
NIST
Answers
Suggested answer: B, D

Explanation:

PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards and requirements for organizations that store, process, or transmit payment card data. It aims to protect cardholder data and prevent fraud and data breaches. GDPR (General Data Protection Regulation) is a regulation that governs the collection, processing, and transfer of personal data of individuals in the European Union. It aims to protect the privacy and rights of data subjects and impose obligations and penalties on data controllers and processors. These are the frameworks that the security officer should map the existing controls to, as they are relevant for a credit card transaction company that has a new office in Europe

A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:

Which of the following best describes this kind of attack?

A.
Directory traversal
A.
Directory traversal
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
API
C.
API
Answers
D.
Request forgery
D.
Request forgery
Answers
Suggested answer: A

Explanation:

Directory traversal is a type of web application attack that involves exploiting a vulnerability in the web server or application to access files or directories that are outside the intended scope or root directory. It can allow an attacker to read, modify, or execute files on the target system by using special characters such as .../ or %2e%2e/ to manipulate the path or URL. In this case, the attacker used .../ to access the /etc/passwd file, which contains user account information on Linux systems.

An annual information security assessment has revealed that several OS-level configurations are not in compliance due to outdated hardening standards the company is using. Which of the following would be best to use to update and reconfigure the OS-level security configurations?

A.
CIS benchmarks
A.
CIS benchmarks
Answers
B.
GDPR guidance
B.
GDPR guidance
Answers
C.
Regional regulations
C.
Regional regulations
Answers
D.
ISO 27001 standards
D.
ISO 27001 standards
Answers
Suggested answer: A

Explanation:

CIS benchmarks are best practices and standards for securing various operating systems, applications, cloud environments, etc. They are developed by a community of experts and updated regularly to reflect the latest threats and vulnerabilities. They can be used to update and reconfigure the OS-level security configurations to ensure compliance and reduce risks.

A network manager is concerned that business may be negatively impacted if the firewall in its data center goes offline. The manager would like to implement a high availability pair to:

A.
decrease the mean time between failures.
A.
decrease the mean time between failures.
Answers
B.
remove the single point of failure.
B.
remove the single point of failure.
Answers
C.
cut down the mean time to repair
C.
cut down the mean time to repair
Answers
D.
reduce the recovery time objective
D.
reduce the recovery time objective
Answers
Suggested answer: B

Explanation:

A single point of failure is a component or element of a system that, if it fails, will cause the entire system to fail or stop functioning. It can pose a high risk and impact for business continuity and availability. A high availability pair is a configuration that involves two identical devices or systems that operate in parallel and provide redundancy and failover capabilities. It can remove the single point of failure by ensuring that if one device or system fails, the other one can take over its functions without interruption or downtime.

After multiple on-premises security solutions were migrated to the cloud, the incident response time increased The analysts are spending a long time trying to trace information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?

A.
CASB
A.
CASB
Answers
B.
VPC
B.
VPC
Answers
C.
SWG
C.
SWG
Answers
D.
CMS
D.
CMS
Answers
Suggested answer: D

Explanation:

CMS (Cloud Management System) is a software or platform that allows an organization to manage and monitor multiple cloud services and resources from a single interface or console. It can optimize the incident response time by providing a centralized view and control of the cloud infrastructure and applications, and enabling faster detection, analysis, and remediation of security incidents across different cloud environments.

A user received an SMS on a mobile phone that asked for bank details. Which of the following social engineering techniques was used in this case?

A.
SPIM
A.
SPIM
Answers
B.
Vishing
B.
Vishing
Answers
C.
Spear phishing
C.
Spear phishing
Answers
D.
Smishing
D.
Smishing
Answers
Suggested answer: D

Explanation:

Smishing is a type of social engineering technique that involves sending fraudulent or malicious text messages (SMS) to a user's mobile phone. It can trick the user into providing personal or financial information, clicking on malicious links, downloading malware, etc., by impersonating a legitimate entity or creating a sense of urgency or curiosity.

A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage Which of the following is most likely the cause?

A.
The GPO prevents the use of flash drives, which triggers a false positive AV indication and restricts the drives to only 512KB of storage
A.
The GPO prevents the use of flash drives, which triggers a false positive AV indication and restricts the drives to only 512KB of storage
Answers
B.
The new flash drives need a driver that is being blocked by the AV software because the flash drives are not on the application's allow list, temporarily restricting the drives to 512KB of storage.
B.
The new flash drives need a driver that is being blocked by the AV software because the flash drives are not on the application's allow list, temporarily restricting the drives to 512KB of storage.
Answers
C.
The new flash drives are incorrectly partitioned, and the systems are automatically trying to use an unapproved application to repartition the drives.
C.
The new flash drives are incorrectly partitioned, and the systems are automatically trying to use an unapproved application to repartition the drives.
Answers
D.
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
D.
The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.
Answers
Suggested answer: D

Explanation:

Mimikatz is a tool that can extract plaintext credentials from memory on Windows systems. A malicious flash drive can bypass the GPO blocking the flash drives by using techniques such as autorun.inf or HID spoofing to execute Mimikatz on the target system without user interaction or consent. This can cause AV alerts indicating Mimikatz attempted to run on the remote systems and also reduce the storage capacity of the flash drives to only 512KB by creating hidden partitions or files on them.

Total 603 questions
Go to page: of 61