ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 49

Add to Whishlist

List of questions

Question 481

Report Export Collapse

An audit report indicates multiple suspicious attempts to access company resources were made. These attempts were not detected by the company. Which of the following would be the best solution to implement on the company's network?

Become a Premium Member for full access
  Unlock Premium Member

Question 482

Report Export Collapse

A security architect is required to deploy to conference rooms some workstations that will allow sensitive data to be displayed on large screens. Due to the nature of the data, it cannot be stored in the conference rooms. The file share is located in a local data center. Which of the following should the security architect recommend to best meet the requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 483

Report Export Collapse

While troubleshooting a firewall configuration, a technician determines that a 'deny any' policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 484

Report Export Collapse

A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?

Become a Premium Member for full access
  Unlock Premium Member

Question 485

Report Export Collapse

A company is auditing the manner in which its European customers' personal information is handled. Which of the following should the company consult?

Become a Premium Member for full access
  Unlock Premium Member

Question 486

Report Export Collapse

An organization is building a new headquarters and has placed fake cameras around the building in an attempt to discourage potential intruders. Which of the following kinds of controls describes this security method?

Become a Premium Member for full access
  Unlock Premium Member

Question 487

Report Export Collapse

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

Become a Premium Member for full access
  Unlock Premium Member

Question 488

Report Export Collapse

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the 'company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 489

Report Export Collapse

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 490

Report Export Collapse

Which of the following threat actors is most likely to be motivated by ideology?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions