ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 45

Add to Whishlist

List of questions

Question 441

Report Export Collapse

A company needs to centralize its logs to create a baseline and have visibility on its security events Which of the following technologies will accomplish this objective?

Become a Premium Member for full access
  Unlock Premium Member

Question 442

Report Export Collapse

Which of the following would be used to find the most common web-applicalion vulnerabilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 443

Report Export Collapse

A network engineer is troubleshooting wireless network connectivity issues that were reported by users The issues are occurring only in the section of the building that is closest to the parking lot.

Users are intermittently experiencing slow speeds when accessing websites and are unable to connect to network drives. The issues appear to increase when laptop users return to their desks after using their devices in other areas of the building There have also been reports of users being required to enter their credentials on web pages in order to gain access to them Which of the following is the most likely cause of this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 444

Report Export Collapse

A malicious actor recently penetrated a company's network and moved laterally to the data center Upon investigation a forensics firm wants to know what was in the memory on the compromised server Which of the following files should be given to the forensics firm?

Become a Premium Member for full access
  Unlock Premium Member

Question 445

Report Export Collapse

A security administrator needs to inspect in-transit files on the enterprise network to search for PI I credit card data, and classification words Which of the following would be the best to use?

Become a Premium Member for full access
  Unlock Premium Member

Question 446

Report Export Collapse

Which of the following would be the best resource for a software developer who is looking to improve secure coding practices for web applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 447

Report Export Collapse

An organization routes all of its traffic through a VPN Most users are remote and connect into a corporate data center that houses confidential information There is a firewall at the internet border, followed by a DLP appliance, the VPN server and the data center itself Which of the following is the weakest design element?

Become a Premium Member for full access
  Unlock Premium Member

Question 448

Report Export Collapse

A user enters a password to log in to a workstation and is then prompted to enter an authentication code Which of the following MFA factors or attributes are being utilized in the authentication process? {Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 449

Report Export Collapse

A company wants to deploy PKI on its internet-facing website The applications that are currently deployed are

β€’ www company.com (mam website)

β€’ contact us company com (for locating a nearby location)

β€’ quotes company.com (for requesting a price quote)

The company wants to purchase one SSL certificate that will work for all the existing applications and any future applications that follow the same naming conventions, such as store company com Which of the following certificate types would best meet the requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 450

Report Export Collapse

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop A security analyst walks the user through an installation of Wireshark and gets a five-minute pcap to analyze. The analyst observes the following output:

CompTIA SY0-601 image Question 441 98531 10022024175359000000

Which of the following attacks does the analyst most likely see in this packet capture?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions