CompTIA SY0-601 Practice Test - Questions Answers, Page 55

List of questions
Question 541

When implementing automation with loT devices, which of the following should be considered first to keep the network secure?
Question 542

A systems administrator set up an automated process that checks for vulnerabilities across the entire environment every morning. Which of the following activities is the systems administrator conducting?
Question 543

Which of the following holds staff accountable while escorting unauthorized personnel?
Question 544

Which of the following is an example of risk avoidance?
Question 545

A vulnerability has been discovered and a known patch to address the vulnerability does not exist.
Which of the following controls works best until a proper fix is released?
Question 546

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks. Which of the following would be best for the security manager to use in a threat model?
Question 547

Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?
Question 548

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge.
Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?
Question 549

An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?
Question 550

An attacker is attempting to harvest user credentials on a client's website. A security analyst notices multiple attempts of random usernames and passwords. When the analyst types in a random username and password, the logon screen displays the following message:
The username you entered does not exist.
Which of the following should the analyst recommend be enabled?
Question