ExamGecko
Home Home / CompTIA / SY0-601

CompTIA SY0-601 Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











A user's login credentials were recently compromised During the investigation, the security analyst determined the user input credentials into a pop-up window when prompted to confirm the username and password However the trusted website does not use a pop-up for entering user colonials Which of the following attacks occurred?

A.
Cross-site scripting
A.
Cross-site scripting
Answers
B.
SOL injection
B.
SOL injection
Answers
C.
DNS poisoning
C.
DNS poisoning
Answers
D.
Certificate forgery
D.
Certificate forgery
Answers
Suggested answer: D

Explanation:

The user input credentials into a pop-up window that was not part of the trusted website. This suggests that the attacker was able to forge a certificate and present a fake website that looked like the legitimate one. This is a type of attack known as certificate forgery, which exploits the trust relationship between users and websites that use SSL/TLS encryption2.

A cybersecurity analyst reviews the log files from a web server end sees a series of files that indicate a directory traversal attack has occurred Which of the following is the analyst most likely seeing?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: C

Explanation:

The log files show that the attacker was able to access files and directories that were not intended to be accessible by web users, such as "/etc/passwd" and "/var/log". This indicates that the attacker was able to exploit a vulnerability in the web server or application that allowed them to manipulate the file path and access arbitrary files on the server. This is a type of attack known as directory traversal, which can lead to information disclosure, privilege escalation, or remote code execution3.

Which of the following describes the ability of code to target a hypervisor from inside a guest OS?

A.
Fog computing
A.
Fog computing
Answers
B.
VM escape
B.
VM escape
Answers
C.
Software-defined networking
C.
Software-defined networking
Answers
D.
Image forgery
D.
Image forgery
Answers
E.
Container breakout
E.
Container breakout
Answers
Suggested answer: B

Explanation:

The ability of code to target a hypervisor from inside a guest OS is known as VM escape. This is a serious security threat that can compromise the entire virtualized environment and allow an attacker to access other guest OSes or the host OS. VM escape can be achieved by exploiting vulnerabilities in the hypervisor software, the guest OS, or the virtual hardware devices4.

A threat actor used a sophisticated attack to breach a well-known ride-sharing. company. The threat actor posted on social media that this action was in response to the company's treatment of its drivers Which of the following best describes tm type of throat actor?

A.
Nation-slate
A.
Nation-slate
Answers
B.
Hacktivist
B.
Hacktivist
Answers
C.
Organized crime
C.
Organized crime
Answers
D.
Shadow IT
D.
Shadow IT
Answers
Suggested answer: B

Explanation:

A threat actor who used a sophisticated attack to breach a well-known ride-sharing company and posted on social media that this action was in response to the company's treatment of its drivers is most likely a hacktivist. A hacktivist is a person who uses hacking skills to promote a social or political cause, such as human rights, environmentalism, or anti-corporatism5.

A company is expanding its threat surface program and allowing individuals to security test the company's internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

A.
Open-source intelligence
A.
Open-source intelligence
Answers
B.
Bug bounty
B.
Bug bounty
Answers
C.
Red team
C.
Red team
Answers
D.
Penetration testing
D.
Penetration testing
Answers
Suggested answer: B

Explanation:

A program that allows individuals to security test the company's internet-facing application and compensates researchers based on the vulnerabilities discovered is best described as a bug bounty program. A bug bounty program is an incentive-based program that rewards ethical hackers for finding and reporting security flaws in software or systems6.

An organization relies on third-party videoconferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources Which of the following would best maintain high-quality videoconferencing while minimizing latency when connected to the VPN?

A.
Using geographic diversity lo have VPN terminators closer to end users
A.
Using geographic diversity lo have VPN terminators closer to end users
Answers
B.
Utilizing split tunneling so only traffic for corporate resources is encrypted
B.
Utilizing split tunneling so only traffic for corporate resources is encrypted
Answers
C.
Purchasing higher bandwidth connections to meet the increased demand
C.
Purchasing higher bandwidth connections to meet the increased demand
Answers
D.
Configuring OoS properly on the VPN accelerators
D.
Configuring OoS properly on the VPN accelerators
Answers
Suggested answer: B

Explanation:

Utilizing split tunneling so only traffic for corporate resources is encrypted would best maintain high-quality videoconferencing while minimizing latency when connected to the VPN. Split tunneling is a technique that allows a VPN user to access both the public internet and the private network simultaneously, without routing all traffic through the VPN. This can improve the performance and quality of videoconferencing applications that rely on low latency and high bandwidth, as well as reduce the load on the VPN server.

A security analyst discovers several jpg photos from a cellular phone during a forensics investigation involving a compromised system The analyst runs a forensics tool to gather file metadata Which of the following would be part of the images if all the metadata is still intact?

A.
The GSS location
A.
The GSS location
Answers
B.
When the file was deleted
B.
When the file was deleted
Answers
C.
The total number of print jobs
C.
The total number of print jobs
Answers
D.
The number of copies made
D.
The number of copies made
Answers
Suggested answer: A

Explanation:

The GPS location would be part of the images if all the metadata is still intact. Metadata is data that describes other data, such as file name, size, date, author, etc. Some metadata can also contain information about the device, software, or location that created or modified the data. For example, some digital cameras and smartphones can embed GPS coordinates into the metadata of photos, which can reveal the location where the photos were taken. This can be useful for forensic analysis, but also pose privacy risks.

The concept of connecting a user account across the systems of multiple enterprises is best known as:

A.
federation
A.
federation
Answers
B.
a remote access policy.
B.
a remote access policy.
Answers
C.
multifactor authentication
C.
multifactor authentication
Answers
D.
single sign-on.
D.
single sign-on.
Answers
Suggested answer: D

Explanation:

The concept of connecting a user account across the systems of multiple enterprises is best known as federation. Federation is a process that allows users to authenticate once and access multiple resources or services across different domains or organizations. For example, a user can use their Google account to sign in to various websites or applications that support federation, without creating separate accounts or passwords for each one. Federation can improve user convenience and security, as well as reduce administrative overhead.

Which of the following scenarios describes a possible business email compromise attack?

A.
An employee receives a gift card request m an email that has an executive's name m the display held to the email
A.
An employee receives a gift card request m an email that has an executive's name m the display held to the email
Answers
B.
Employees who open an email attachment receive messages demanding payment m order to access files
B.
Employees who open an email attachment receive messages demanding payment m order to access files
Answers
C.
A service desk employee receives an email from the HR director asking for log-in credentials lo a cloud administrator account
C.
A service desk employee receives an email from the HR director asking for log-in credentials lo a cloud administrator account
Answers
D.
An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.
D.
An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.
Answers
Suggested answer: A

Explanation:

An employee receiving a gift card request in an email that has an executive's name in the display field to the email describes a possible business email compromise attack. Business email compromise (BEC) is a type of phishing attack that targets employees who have access to financial or sensitive information, such as accounting, human resources, or executive staff. The attacker impersonates a trusted person, such as a manager, vendor, or client, and requests a fraudulent payment, wire transfer, gift card purchase, or personal information. The attacker may spoof the email address or display name, use a look-alike domain, or compromise a legitimate email account to make the request seem authentic.

The IT department's on-site developer has been with the team for many years. Each lime an application is released; the security team is able to identify multiple vulnerabilities Which of the Mowing would best help the team ensure the application is ready to be released to production?

A.
Limit the use of third-party libraries.
A.
Limit the use of third-party libraries.
Answers
B.
Prevent data exposure queries.
B.
Prevent data exposure queries.
Answers
C.
Obfuscate the source code
C.
Obfuscate the source code
Answers
D.
Submit the application to OA before releasing it.
D.
Submit the application to OA before releasing it.
Answers
Suggested answer: D

Explanation:

Submitting the application to QA before releasing it would best help the team ensure the application is ready to be released to production. QA stands for quality assurance, which is a process of testing and verifying that a software product meets the specified requirements and standards. QA can help identify and fix any bugs, errors, vulnerabilities, or performance issues before the software is deployed to the end users. QA can also ensure that the software meets the security objectives and complies with the best practices and regulations.

Total 603 questions
Go to page: of 61