ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 52

Add to Whishlist

List of questions

Question 511

Report Export Collapse

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

Become a Premium Member for full access
  Unlock Premium Member

Question 512

Report Export Collapse

A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 513

Report Export Collapse

Which of the following would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations?

Become a Premium Member for full access
  Unlock Premium Member

Question 514

Report Export Collapse

Developers are writing code and merging it into shared repositories several times a day. where it is tested automatically. Which of the following concepts does this best represent?

Become a Premium Member for full access
  Unlock Premium Member

Question 515

Report Export Collapse

The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, including during a pandemic or crisis. However, the CEO is concerned that some staff members may take advantage of the flexibility and work from high-risk countries while on holiday or outsource work to a third-party organization in another country. The Chief Information Officer believes the company can implement some basic controls to mitigate the majority of the risk. Which of the following would be best to mitigate the CEO's concerns? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 516

Report Export Collapse

During an incident, an EDR system detects an increase in the number of encrypted outbound connections from multiple hosts. A firewall is also reporting an increase in outbound connections that use random high ports. An analyst plans to review the correlated logs to find the source of the incident. Which of the following tools will best assist the analyst?

Become a Premium Member for full access
  Unlock Premium Member

Question 517

Report Export Collapse

Which of the following is used to validate a certificate when it is presented to a user?

Become a Premium Member for full access
  Unlock Premium Member

Question 518

Report Export Collapse

A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into clicking the following:

CompTIA SY0-601 image Question 509 98599 10022024175359000000

Which of the following was most likely observed?

Become a Premium Member for full access
  Unlock Premium Member

Question 519

Report Export Collapse

Recent changes to a company's BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 520

Report Export Collapse

Employees in the research and development business unit receive extensive training 10 ensure they understand how to best protect company dat a. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions