ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 52

Question list
Search
Search

List of questions

Search

Related questions











A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

A.
Accept
A.
Accept
Answers
B.
Transfer
B.
Transfer
Answers
C.
Mitigate
C.
Mitigate
Answers
D.
Avoid
D.
Avoid
Answers
Suggested answer: B

Explanation:

A company purchased cyber insurance to address items listed on the risk register. This represents a transfer strategy. A transfer strategy involves transferring or sharing some or all of the responsibility or impact of a risk to another party, such as an insurer, a supplier, or a partner. A transfer strategy can help to reduce the financial liability or exposure of the company in case of a security incident or breach. Reference: https://www.comptia.org/blog/what-is-cyber-insurance

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?

A.
A worm is propagating across the network.
A.
A worm is propagating across the network.
Answers
B.
Data is being exfiltrated.
B.
Data is being exfiltrated.
Answers
C.
A logic bomb is deleting data.
C.
A logic bomb is deleting data.
Answers
D.
Ransomware is encrypting files.
D.
Ransomware is encrypting files.
Answers
Suggested answer: B

Explanation:

Data is being exfiltrated when an internal system is sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Data exfiltration is the unauthorized transfer of data from a system or network to an external destination or actor. Data exfiltration can be performed by malicious insiders or external attackers who have compromised the system or network. DNS queries are requests for resolving domain names to IP addresses. DNS queries can be used as a covert channel for data exfiltration by encoding data in the domain names or subdomains and sending them to a malicious DNS server that can decode and collect the data.

Reference: https://www.comptia.org/blog/what-is-data-exfiltration

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Which of the following would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations?

A.
Machine learning
A.
Machine learning
Answers
B.
DNS sinkhole
B.
DNS sinkhole
Answers
C.
Blocklist
C.
Blocklist
Answers
D.
Honey pot
D.
Honey pot
Answers
Suggested answer: B

Explanation:

A DNS sinkhole would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations. A DNS sinkhole is a technique that involves redirecting malicious or unwanted domain names to an alternative IP address, such as a black hole, a honeypot, or a warning page. A DNS sinkhole can help to prevent or disrupt the communication between infected systems and command-and-control servers, malware distribution sites, phishing sites, or botnets. A DNS sinkhole can also help to identify and isolate infected systems by monitoring the traffic to the sinkhole IP address. Reference: https://www.comptia.org/blog/what-is-a-dns-sinkhole

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Developers are writing code and merging it into shared repositories several times a day. where it is tested automatically. Which of the following concepts does this best represent?

A.
Functional testing
A.
Functional testing
Answers
B.
Stored procedures
B.
Stored procedures
Answers
C.
Elasticity
C.
Elasticity
Answers
D.
Continuous Integration
D.
Continuous Integration
Answers
Suggested answer: D

Explanation:

Continuous Integration is the concept that best represents developers writing code and merging it into shared repositories several times a day, where it is tested automatically. Continuous Integration is a software development practice that involves integrating code changes from multiple developers into a shared repository frequently and running automated tests to ensure quality and functionality.

Continuous Integration can help to detect and fix errors early, improve collaboration, reduce rework, and accelerate delivery. Reference: https://www.comptia.org/blog/what-is-devops

https://www.certblaster.com/wp-content/uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, including during a pandemic or crisis. However, the CEO is concerned that some staff members may take advantage of the flexibility and work from high-risk countries while on holiday or outsource work to a third-party organization in another country. The Chief Information Officer believes the company can implement some basic controls to mitigate the majority of the risk. Which of the following would be best to mitigate the CEO's concerns? (Select two).

A.
Geolocation
A.
Geolocation
Answers
B.
Time-of-day restrictions
B.
Time-of-day restrictions
Answers
C.
Certificates
C.
Certificates
Answers
D.
Tokens
D.
Tokens
Answers
E.
Geotagging
E.
Geotagging
Answers
F.
Role-based access controls
F.
Role-based access controls
Answers
Suggested answer: A, B

Explanation:

Geolocation and time-of-day restrictions would be best to mitigate the CEO's concerns about staff members working from high-risk countries while on holiday or outsourcing work to a third-party organization in another country. Geolocation is a technique that involves determining the physical location of a device or user based on its IP address, GPS coordinates, Wi-Fi signals, or other indicators. Time-of-day restrictions are policies that limit the access or usage of resources based on the time of day or week. Geolocation and time-of-day restrictions can help to enforce access control rules, prevent unauthorized access, detect anomalous behavior, and comply with regulations.

Reference: https://www.comptia.org/blog/what-is-geolocation https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

During an incident, an EDR system detects an increase in the number of encrypted outbound connections from multiple hosts. A firewall is also reporting an increase in outbound connections that use random high ports. An analyst plans to review the correlated logs to find the source of the incident. Which of the following tools will best assist the analyst?

A.
A vulnerability scanner
A.
A vulnerability scanner
Answers
B.
A NGFW
B.
A NGFW
Answers
C.
The Windows Event Viewer
C.
The Windows Event Viewer
Answers
D.
A SIEM
D.
A SIEM
Answers
Suggested answer: D

Explanation:

A security information and event management (SIEM) system will best assist the analyst to review the correlated logs to find the source of the incident. A SIEM system is a type of software or service that collects, analyzes, and correlates logs and events from multiple sources, such as firewalls, EDR systems, servers, or applications. A SIEM system can help to detect and respond to security incidents, provide alerts and reports, support investigations and forensics, and comply with regulations.

Reference: https://www.comptia.org/blog/what-is-a-siem https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Which of the following is used to validate a certificate when it is presented to a user?

A.
OCSP
A.
OCSP
Answers
B.
CSR
B.
CSR
Answers
C.
CA
C.
CA
Answers
D.
CRC
D.
CRC
Answers
Suggested answer: A

Explanation:

Online Certificate Status Protocol (OCSP) is used to validate a certificate when it is presented to a user. OCSP is a protocol that allows a client or browser to query the status of a certificate from an OCSP responder, which is a server that maintains and provides the revocation status of certificates issued by a certificate authority (CA). OCSP can help to verify the authenticity and validity of a certificate and prevent the use of revoked or expired certificates. Reference:

https://www.comptia.org/blog/what-is-ocsp https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into clicking the following:

Which of the following was most likely observed?

A.
DLL injection
A.
DLL injection
Answers
B.
Session replay
B.
Session replay
Answers
C.
SQLi
C.
SQLi
Answers
D.
xss
D.
xss
Answers
Suggested answer: D

Explanation:

Cross-site scripting is a type of web application attack that involves injecting malicious code or scripts into a trusted website or application. The malicious code or script can execute in the browser of the victim who visits the website or application, and can perform actions such as stealing cookies, redirecting to malicious sites, displaying fake content, or compromising the system. Reference:

https://www.comptia.org/blog/what-is-cross-site-scripting https://www.certblaster.com/wpcontent/ uploads/2020/11/CompTIA-Security-SY0-601-Exam-Objectives-1.0.pdf

Recent changes to a company's BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?

A.
Facial recognition
A.
Facial recognition
Answers
B.
Six-digit PIN
B.
Six-digit PIN
Answers
C.
PKI certificate
C.
PKI certificate
Answers
D.
Smart card
D.
Smart card
Answers
Suggested answer: A

Explanation:

Facial recognition is a type of biometric authentication that uses the unique features of a person's face to verify their identity. Facial recognition is not something you know or have, but something you are, which is one of the three factors of authentication. Facial recognition can use various methods and technologies, such as 2D or 3D images, infrared sensors, machine learning and more, to capture, analyze and compare facial data. Facial recognition can provide a convenient and secure way to authenticate users on personal mobile devices, as it does not require any additional hardware or input from the user. Facial recognition can also be used in conjunction with other factors, such as passwords or tokens, to provide multi-factor authentication. Verified Reference:

Biometrics - SY0-601 CompTIA Security+ : 2.4 - Professor Messer IT Certification Training Courses

https://www.professormesser.com/security-plus/sy0-601/sy0-601-video/biometrics/ (See Facial Recognition) Security+ (Plus) Certification | CompTIA IT Certifications

https://www.comptia.org/certifications/security (See Domain 2: Architecture and Design, Objective 2.4: Given a scenario, implement identity and access management controls.) Biometric and Facial Recognition - CompTIA Security+ Certification (SY0-501)

https://www.oreilly.com/library/view/comptia-security-certification/9781789953091/video9_6.html (See Biometric and Facial Recognition)


Employees in the research and development business unit receive extensive training 10 ensure they understand how to best protect company dat a. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

A.
Encrypted
A.
Encrypted
Answers
B.
Intellectual property
B.
Intellectual property
Answers
C.
Critical
C.
Critical
Answers
D.
Data in transit
D.
Data in transit
Answers
Suggested answer: B

Explanation:

Intellectual property is a type of data that is proprietary and unique to an organization. It includes trade secrets and other information that the organization does not want to share with third parties or competitors. Employees in the research and development business unit are most likely to use intellectual property in their day-to-day work activities, as they are involved in creating new products, services, or processes for the organization. Intellectual property data requires a high level of security and protection, as it can provide a competitive advantage or disadvantage if leaked or stolen.

Encrypted data is not a type of data, but a state of data. Encryption is a method of transforming data into an unreadable format using a key, so that only authorized parties can access it. Encryption can be applied to any type of data, such as intellectual property, critical data, or data in transit.

Critical data is a type of data that is essential for the operation and continuity of an organization. It includes information such as customer records, financial transactions, employee details, and so on.

Critical data may or may not be intellectual property, depending on the nature and source of the data. Critical data also requires a high level of security and protection, as it can affect the reputation, performance, or legal compliance of the organization.

Data in transit is not a type of data, but a state of data. Data in transit refers to data that is moving from one location to another over a network, such as the internet, a LAN, or a WAN. Data in transit can be vulnerable to interception, modification, or theft by malicious actors. Data in transit can also be any type of data, such as intellectual property, critical data, or PII.

Total 603 questions
Go to page: of 61