ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 55

Add to Whishlist

List of questions

Question 541

Report Export Collapse

When implementing automation with loT devices, which of the following should be considered first to keep the network secure?

Become a Premium Member for full access
  Unlock Premium Member

Question 542

Report Export Collapse

A systems administrator set up an automated process that checks for vulnerabilities across the entire environment every morning. Which of the following activities is the systems administrator conducting?

Become a Premium Member for full access
  Unlock Premium Member

Question 543

Report Export Collapse

Which of the following holds staff accountable while escorting unauthorized personnel?

Become a Premium Member for full access
  Unlock Premium Member

Question 544

Report Export Collapse

Which of the following is an example of risk avoidance?

Become a Premium Member for full access
  Unlock Premium Member

Question 545

Report Export Collapse

A vulnerability has been discovered and a known patch to address the vulnerability does not exist.

Which of the following controls works best until a proper fix is released?

Become a Premium Member for full access
  Unlock Premium Member

Question 546

Report Export Collapse

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial opinion article in a national newspaper, which may result in new cyberattacks. Which of the following would be best for the security manager to use in a threat model?

Become a Premium Member for full access
  Unlock Premium Member

Question 547

Report Export Collapse

Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?

Become a Premium Member for full access
  Unlock Premium Member

Question 548

Report Export Collapse

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge.

Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?

Become a Premium Member for full access
  Unlock Premium Member

Question 549

Report Export Collapse

An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?

Become a Premium Member for full access
  Unlock Premium Member

Question 550

Report Export Collapse

An attacker is attempting to harvest user credentials on a client's website. A security analyst notices multiple attempts of random usernames and passwords. When the analyst types in a random username and password, the logon screen displays the following message:

The username you entered does not exist.

Which of the following should the analyst recommend be enabled?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions