ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 48

Add to Whishlist

List of questions

Question 471

Report Export Collapse

An organization is repairing the damage after an incident. Which of the following controls is being implemented?

Become a Premium Member for full access
  Unlock Premium Member

Question 472

Report Export Collapse

A financial institution would like to store its customer data in the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 473

Report Export Collapse

A security professional wants to enhance the protection of a critical environment that is Used to store and manage a company's encryption keys. The selected technology should be tamper resistant. Which of the following should the security professional implement to achieve the goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 474

Report Export Collapse

Which of the following supplies non-repudiation during a forensics investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 475

Report Export Collapse

A user downloaded an extension for a browser, and the user's device later became infected. The analyst who Is Investigating the Incident saw various logs where the attacker was hiding activity by deleting dat

Become a Premium Member for full access
  Unlock Premium Member

Question 476

Report Export Collapse

A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 477

Report Export Collapse

Which of the following describes the exploitation of an interactive process to gain access to restricted areas?

Become a Premium Member for full access
  Unlock Premium Member

Question 478

Report Export Collapse

As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 479

Report Export Collapse

A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate.

The current solution appears to do a full backup every night. Which of the following would use the least amount of storage space for backups?

Become a Premium Member for full access
  Unlock Premium Member

Question 480

Report Export Collapse

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to Implement mitigation techniques to prevent further spread. Which of the following is the best course of action for the analyst to take?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions