ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 48

Question list
Search
Search

List of questions

Search

Related questions











An organization is repairing the damage after an incident. Which of the following controls is being implemented?

A.
Detective
A.
Detective
Answers
B.
Preventive
B.
Preventive
Answers
C.
Corrective
C.
Corrective
Answers
D.
Compensating
D.
Compensating
Answers
Suggested answer: C

Explanation:

A corrective control is a type of security control that is designed to mitigate the damage caused by a security incident or to restore the normal operations after an incident. A corrective control can include actions such as restoring from backups, applying patches, isolating infected systems, or implementing new policies and procedures. A corrective control is different from a preventive control, which aims to stop an incident from happening, or a detective control, which aims to identify and record an incident.

Reference:

https://www.oreilly.com/library/view/comptia-security-all-in-one/9781260464016/ch31.xhtml


A financial institution would like to store its customer data in the cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution Is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would best meet the requirement?

A.
Asymmetric
A.
Asymmetric
Answers
B.
Symmetric
B.
Symmetric
Answers
C.
Homomorphic
C.
Homomorphic
Answers
D.
Ephemeral
D.
Ephemeral
Answers
Suggested answer: C

Explanation:

Homomorphic encryption is a cryptographic technique that allows data to be stored, accessed and manipulated while encrypted. Homomorphic encryption enables computations to be performed on ciphertexts, generating an encrypted result that, when decrypted, matches the result of the operations as if they had been performed on the plaintext. Homomorphic encryption can prevent the cloud service provider from being able to decipher the data due to its sensitivity, as the data remains encrypted at all times. Homomorphic encryption is not concerned about computational overheads and slow speeds, as it trades off performance for security and privacy.

Reference:

https://www.microsoft.com/en-us/research/wp-content/uploads/2018/01/security_homomorphic_encryption_white_paper.pdf

A security professional wants to enhance the protection of a critical environment that is Used to store and manage a company's encryption keys. The selected technology should be tamper resistant. Which of the following should the security professional implement to achieve the goal?

A.
DLP
A.
DLP
Answers
B.
HSM
B.
HSM
Answers
C.
CA
C.
CA
Answers
D.
FIM
D.
FIM
Answers
Suggested answer: B

Explanation:

HSM stands for hardware security module, which is a physical device that is used to store and manage cryptographic keys in a secure and tamper-resistant manner. HSMs can provide high-performance encryption and decryption operations, as well as key generation, backup, and recovery. HSMs can also prevent unauthorized access or extraction of the keys, even by the cloud service provider or the HSM vendor. HSMs can enhance the protection of a critical environment that is used to store and manage encryption keys for a financial institution or any other organization that deals with sensitive data.

Reference:

https://www.comptia.org/certifications/security

Which of the following supplies non-repudiation during a forensics investigation?

A.
Dumping volatile memory contents first
A.
Dumping volatile memory contents first
Answers
B.
Duplicating a drive with dd
B.
Duplicating a drive with dd
Answers
C.
Using a SHA-2 signature of a drive image
C.
Using a SHA-2 signature of a drive image
Answers
D.
Logging everyone in contact with evidence
D.
Logging everyone in contact with evidence
Answers
E.
Encrypting sensitive data
E.
Encrypting sensitive data
Answers
Suggested answer: C

Explanation:

Using a SHA-2 signature of a drive image is a way to supply non-repudiation during a forensics investigation, as it can verify the integrity and authenticity of the data captured in the image. SHA-2 is a family of secure hash algorithms that can produce a unique and fixed-length digest of any input data. By hashing the drive image and comparing the signature with the original hash, the investigator can prove that the image has not been altered or tampered with since the time of acquisition. This can also help to identify the source of the data and prevent any denial from the suspect.

Reference:

https://www.skillsoft.com/course/comptia-security-incident-response-digital-forensics-supporting-investigations-f889a108-9721-4e2c-8e9e-b49b01295e48

A user downloaded an extension for a browser, and the user's device later became infected. The analyst who Is Investigating the Incident saw various logs where the attacker was hiding activity by deleting dat

A.
The following was observed running:New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -Driveletter C - FileSystemLabel 'New'-FileSystem NTFS - Full -Force -Confirm:$falseWhich of the following is the malware using to execute the attack?
A.
The following was observed running:New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -Driveletter C - FileSystemLabel 'New'-FileSystem NTFS - Full -Force -Confirm:$falseWhich of the following is the malware using to execute the attack?
Answers
B.
PowerShell
B.
PowerShell
Answers
C.
Python
C.
Python
Answers
D.
Bash
D.
Bash
Answers
E.
Macros
E.
Macros
Answers
Suggested answer: A

Explanation:

PowerShell is a scripting language and command-line shell that can be used to automate tasks and manage systems. PowerShell can also be used by malware to execute malicious commands and evade detection. The code snippet in the question is a PowerShell command that creates a new partition on disk 2, formats it with NTFS file system, and assigns it a drive letter C. This could be part of an attack that wipes out the original data on the disk or creates a hidden partition for storing malware or stolen data.

Reference:

https://learn.microsoft.com/en-us/powershell/module/storage/new-partition?view=windowsserver2022-ps

A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the future?

A.
User training
A.
User training
Answers
B.
CAsB
B.
CAsB
Answers
C.
MDM
C.
MDM
Answers
D.
EDR
D.
EDR
Answers
Suggested answer: D

Explanation:


Which of the following describes the exploitation of an interactive process to gain access to restricted areas?

A.
Persistence
A.
Persistence
Answers
B.
Port scanning
B.
Port scanning
Answers
C.
Privilege escalation
C.
Privilege escalation
Answers
D.
Pharming
D.
Pharming
Answers
Suggested answer: C

Explanation:

Privilege escalation describes the exploitation of an interactive process to gain access to restricted areas. It is a type of attack that allows a normal user to obtain higher privileges or access rights on a system or network, such as administrative or root access. Privilege escalation can be achieved by exploiting a vulnerability, design flaw, or misconfiguration in the system or application. Privilege escalation can allow an attacker to perform unauthorized actions, such as accessing sensitive data, installing malware, or compromising other systems.

Reference:

https://www.linkedin.com/learning/comptia-security-plus-sy0-601-cert-prep-2-secure-code-design-and-implementation/privilege-escalation

As part of the building process for a web application, the compliance team requires that all PKI certificates are rotated annually and can only contain wildcards at the secondary subdomain level. Which of the following certificate properties will meet these requirements?

A.
HTTPS://*.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
A.
HTTPS://*.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
Answers
B.
HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
B.
HTTPS://app1.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
Answers
C.
HTTPS://*.app1.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
C.
HTTPS://*.app1.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2022
Answers
D.
HTTPS://'.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2023
D.
HTTPS://'.comptia.org, Valid from April 10 00:00:00 2021 - April 8 12:00:00 2023
Answers
Suggested answer: C

Explanation:

This certificate property will meet the requirements because it has a wildcard at the secondary subdomain level (.app1.comptia.org), which means it can be used for any subdomain under app1.comptia.org, such as test.app1.comptia.org or dev.app1.comptia.org. It also has a validity period of less than one year, which means it will need to be rotated annually. The other options do not meet the requirements because they either have a wildcard at the primary domain level (.comptia.org), which is not allowed, or they have a validity period of more than one year, which is too long.

A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate.

The current solution appears to do a full backup every night. Which of the following would use the least amount of storage space for backups?

A.
A weekly, incremental backup with daily differential backups
A.
A weekly, incremental backup with daily differential backups
Answers
B.
A weekly, full backup with daily snapshot backups
B.
A weekly, full backup with daily snapshot backups
Answers
C.
A weekly, full backup with daily differential backups
C.
A weekly, full backup with daily differential backups
Answers
D.
A weekly, full backup with daily incremental backups
D.
A weekly, full backup with daily incremental backups
Answers
Suggested answer: D

Explanation:

A weekly, full backup with daily incremental backups would use the least amount of storage space for backups, as it would only store the changes made since the last backup, whether it is a full or incremental backup. Incremental backups are faster and use less storage space than full or differential backups, but they require more time and media to restore data. A full backup is a complete copy of all data, which requires more time and storage space to perform, but allows a faster and easier recovery. A differential backup is a copy of the data that changed since the last full backup, which requires less time and storage space than a full backup, but more than an incremental backup. A differential backup allows a faster recovery than an incremental backup, but slower than a full backup.

Reference:

https://www.techtarget.com/searchdatabackup/feature/Full-incremental-or-differential-How-to-choose-the-correct-backup-type

https://www.nakivo.com/blog/backup-types-explained/

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to Implement mitigation techniques to prevent further spread. Which of the following is the best course of action for the analyst to take?

A.
Apply a DLP solution.
A.
Apply a DLP solution.
Answers
B.
Implement network segmentation.
B.
Implement network segmentation.
Answers
C.
Utilize email content filtering.
C.
Utilize email content filtering.
Answers
D.
Isolate the infected attachment.
D.
Isolate the infected attachment.
Answers
Suggested answer: D

Explanation:

Isolating the infected attachment is the best course of action for the analyst to take to prevent further spread of the worm. A worm is a type of malware that can self-replicate and infect other devices without human interaction. By isolating the infected attachment, the analyst can prevent the worm from spreading to other devices or networks via email, file-sharing, or other means. Isolating the infected attachment can also help the analyst to analyze the worm and determine its source, behavior, and impact.

Reference:

https://www.security.org/antivirus/computer-worm/

https://sec.cloudapps.cisco.com/security/center/resources/worm_mitigation_whitepaper.html

Total 603 questions
Go to page: of 61