ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 44

Add to Whishlist

List of questions

Question 431

Report Export Collapse

A security analyst receives an alert from the company's S1EM that anomalous activity is coming from a local source IP address of 192 168 34.26 The Chief Information Security Officer asks the analyst to block the originating source Several days later another employee opens an internal ticket stating that vulnerability scans are no longer being performed property. The IP address the employee provides is 192 168.34 26. Which of the following describes this type of alert?

Become a Premium Member for full access
  Unlock Premium Member

Question 432

Report Export Collapse

Law enforcement officials sent a company a notification that states electronically stored information and paper documents cannot be destroyed. Which of the following explains this process?

Become a Premium Member for full access
  Unlock Premium Member

Question 433

Report Export Collapse

Which of the following is a primary security concern for a company setting up a BYOD program?

Become a Premium Member for full access
  Unlock Premium Member

Question 434

Report Export Collapse

An information security officer at a credit card transaction company is conducting a frameworkmapping exercise with the internal controls. The company recently established a new office in Europe. To which of the following frameworks should the security officer map the existing controls' (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 435

Report Export Collapse

A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:

CompTIA SY0-601 image Question 426 98516 10022024175359000000CompTIA SY0-601 image Question 426 98516 10022024175359000000

Which of the following best describes this kind of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 436

Report Export Collapse

An annual information security assessment has revealed that several OS-level configurations are not in compliance due to outdated hardening standards the company is using. Which of the following would be best to use to update and reconfigure the OS-level security configurations?

Become a Premium Member for full access
  Unlock Premium Member

Question 437

Report Export Collapse

A network manager is concerned that business may be negatively impacted if the firewall in its data center goes offline. The manager would like to implement a high availability pair to:

Become a Premium Member for full access
  Unlock Premium Member

Question 438

Report Export Collapse

After multiple on-premises security solutions were migrated to the cloud, the incident response time increased The analysts are spending a long time trying to trace information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?

Become a Premium Member for full access
  Unlock Premium Member

Question 439

Report Export Collapse

A user received an SMS on a mobile phone that asked for bank details. Which of the following social engineering techniques was used in this case?

Become a Premium Member for full access
  Unlock Premium Member

Question 440

Report Export Collapse

A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage Which of the following is most likely the cause?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions