ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

Related questions











Server administrators want to configure a cloud solution so that computing memory and processor usage are maximized most efficiently across a number of virtual servers. They also need to avoid potential denial-of-service situations caused by availability. Which of the following should administrators configure to maximize system availability while efficiently utilizing available computing power?

A.
Dynamic resource allocation
A.
Dynamic resource allocation
Answers
B.
High availability
B.
High availability
Answers
C.
Segmentation
C.
Segmentation
Answers
D.
Container security
D.
Container security
Answers
Suggested answer: A

Explanation:

Dynamic resource allocation is a technique that allows cloud providers to adjust the amount and distribution of computing resources according to the changing demand and capacity of the cloud environment1. Dynamic resource allocation can improve the efficiency and utilization of available computing power, as well as reduce the cost and energy consumption of the cloud infrastructure1. Dynamic resource allocation can also enhance the system availability and reliability by avoiding potential denial-of-service situations caused by overloading or under-provisioning of resources1.

An organization is concerned that ils hosted web servers are not running the most updated version of the software. Which of the following would work best to help identify potential vulnerabilities?

A.
hping3 -S compcia.org -p 80
A.
hping3 -S compcia.org -p 80
Answers
B.
nc -1 -v comptia.crg -p 80
B.
nc -1 -v comptia.crg -p 80
Answers
C.
nmap comptia.org -p 80 -sv
C.
nmap comptia.org -p 80 -sv
Answers
D.
nslookup -port«80 comptia.org
D.
nslookup -port«80 comptia.org
Answers
Suggested answer: C

Explanation:

nmap is a network scanning tool that can perform various tasks such as port scanning, service detection, version detection, OS detection, vulnerability scanning, etc… nmap comptia.org -p 80 -sv is a command that scans port 80 (the default port for HTTP) on comptia.org domain name and tries to identify the service name and version running on that port. This can help identify potential vulnerabilities in the web server software by comparing the version with known exploits or patches.

A security engineer needs to recommend a solution to defend against malicious actors misusing protocols and being allowed through network defenses. Which of the following will the engineer most likely recommended?

A.
A content filter
A.
A content filter
Answers
B.
AWAF
B.
AWAF
Answers
C.
A next-generation firewall
C.
A next-generation firewall
Answers
D.
An IDS
D.
An IDS
Answers
Suggested answer: C

Explanation:

A next-generation firewall (NGFW) is a solution that can defend against malicious actors misusing protocols and being allowed through network defenses. A NGFW is a type of firewall that can perform deep packet inspection, application-level filtering, intrusion prevention, malware detection, and identity-based access control. A NGFW can also use threat intelligence and behavioral analysis to identify and block malicious traffic based on protocols, signatures, or anomalies. Reference:

https://www.comptia.org/blog/what-is-a-next-generation-firewall https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

An analyst is concerned about data leaks and wants to restrict access to internet services to authorized users only. The analyst also wants to control the actions each user can perform on each service. Which of the following would be the best technology for the analyst to consider implementing?

A.
DLP
A.
DLP
Answers
B.
VPC
B.
VPC
Answers
C.
CASB
C.
CASB
Answers
D.
Content filtering
D.
Content filtering
Answers
Suggested answer: C

Explanation:

A cloud access security broker (CASB) is a technology that can restrict access to internet services to authorized users only and control the actions each user can perform on each service. A CASB is a type of software or service that acts as an intermediary between users and cloud service providers. A

CASB can enforce security policies, monitor user activity, detect and prevent data leaks, encrypt data, and provide visibility and auditability of cloud usage. Reference:

https://www.comptia.org/blog/what-is-a-cloud-access-security-broker

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

An organization is outlining data stewardship roles and responsibilities. Which of the following employee roles would determine the purpose of data and how to process it?

A.
Data custodian
A.
Data custodian
Answers
B.
Data controller
B.
Data controller
Answers
C.
Data protection officer
C.
Data protection officer
Answers
D.
Data processor
D.
Data processor
Answers
Suggested answer: C

Explanation:


A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity incident response team. The caller asks the technician to verify the network's internal firewall IP address. Which of the following is the technician's best course of action?

A.
Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller.
A.
Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller.
Answers
B.
Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone.
B.
Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone.
Answers
C.
Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer.
C.
Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer.
Answers
D.
Request the caller send an email for identity verification and provide the requested information via email to the caller.
D.
Request the caller send an email for identity verification and provide the requested information via email to the caller.
Answers
Suggested answer: C

Explanation:

This is the best course of action for the help desk technician because it can help prevent a potential social engineering attack. Social engineering is a technique that involves manipulating or deceiving people into revealing sensitive information or performing actions that compromise security. The caller may be impersonating a member of the organization's cybersecurity incident response team to obtain the network's internal firewall IP address, which could be used for further attacks. The help desk technician should not provide any information over the phone without verifying the caller's identity and authorization. The help desk technician should also report the incident to the organization's cybersecurity officer for investigation and response. Reference:

https://www.comptia.org/blog/social-engineering-explained https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Several universities are participating in a collaborative research project and need to share compute and storage resources. Which of the following cloud deployment strategies would best meet this need?

A.
Community
A.
Community
Answers
B.
Private
B.
Private
Answers
C.
Public
C.
Public
Answers
D.
Hybrid
D.
Hybrid
Answers
Suggested answer: A

Explanation:

A community cloud deployment strategy would best meet the need of several universities participating in a collaborative research project and needing to share compute and storage resources. A community cloud is a type of cloud service model that provides a shared platform for multiple organizations with common interests, goals, or requirements. A community cloud can offer benefits such as cost savings, scalability, security, privacy, compliance, and collaboration. Reference:

https://www.comptia.org/blog/cloud-service-models-saas-paas-and-iaas-explained

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding credit card statement with unusual purchases. Which of the following attacks took place?

A.
On-path attack
A.
On-path attack
Answers
B.
Protocol poisoning
B.
Protocol poisoning
Answers
C.
Domain hijacking
C.
Domain hijacking
Answers
D.
Bluejacking
D.
Bluejacking
Answers
Suggested answer: A

Explanation:

An on-path attack is an attack that took place when an attacker was eavesdropping on a user who was shopping online and was able to spoof the IP address associated with the shopping site. An onpath attack is a type of network attack that involves intercepting or modifying traffic between two parties by placing oneself in the communication path. An on-path attack can also be called a man-inthe-middle attack or a session hijacking attack. An on-path attacker can steal sensitive information, such as credit card details, or redirect the user to a malicious website. Reference:

https://www.comptia.org/blog/what-is-a-man-in-the-middle-attack

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?

A.
Cross-site scripting
A.
Cross-site scripting
Answers
B.
Buffer overflow
B.
Buffer overflow
Answers
C.
Jailbreaking
C.
Jailbreaking
Answers
D.
Side loading
D.
Side loading
Answers
Suggested answer: C

Explanation:

Jailbreaking is the vulnerability that the organization is addressing by adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Jailbreaking is the process of removing the restrictions or limitations imposed by the manufacturer or carrier on a mobile device, such as an iPhone or iPad. Jailbreaking can allow users to install unauthorized applications, customize settings, or access system files. However, jailbreaking can also expose the device to security risks, such as malware, data loss, or warranty voidance. Reference:

https://www.comptia.org/blog/what-is-jailbreaking https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Which of the following teams combines both offensive and defensive testing techniques to protect an organization's critical systems?

A.
Red
A.
Red
Answers
B.
Blue
B.
Blue
Answers
C.
Purple
C.
Purple
Answers
D.
Yellow
D.
Yellow
Answers
Suggested answer: C

Explanation:

A purple team combines both offensive and defensive testing techniques to protect an organization's critical systems. A purple team is a type of cybersecurity team that consists of members from both the red team and the blue team. The red team performs simulated attacks on the organization's systems, while the blue team defends against them. The purple team facilitates the collaboration and communication between the red team and the blue team, and provides feedback and recommendations for improvement. A purple team can help the organization identify and remediate vulnerabilities, enhance security controls, and increase resilience. Reference:

https://www.comptia.org/blog/red-team-blue-team-purple-team https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Total 603 questions
Go to page: of 61