CompTIA SY0-601 Practice Test - Questions Answers, Page 58

List of questions
Question 571

During a recent penetration test, a tester plugged a laptop into an Ethernet port in an unoccupied conference room and obtained a valid IP address. Which of the following would have best prevented this avenue of attack?
Question 572

Which of the following agreements defines response time, escalation points, and performance metrics?
Question 573

Which of the following scenarios best describes a risk reduction technique?
Question 574

The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:
Question 575

An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker most likely attempting?
Question 576

Following a prolonged data center outage that affected web-based sales, a company has decided to move its operations to a private cloud solution The security team has received the following requirements
• There must be visibility into how teams are using cloud-based services
• The company must be able to identity when data related to payment cards is being sent to the cloud
• Data must be available regardless of the end user's geographic location
• Administrators need a single pane-of-glass view into traffic and trends Which of the following should the security analyst recommend?
Question 577

Which of the following components can be used to consolidate and forward inbound internet traffic to multiple cloud environments though a single firewall?
Question 578

A routine audit of medical billing claims revealed that several claims were submitted without the subscriber's knowledge A review of the audit logs for the medical billing company's system indicated a company employee downloaded customer records and adjusted the direct deposit information to a personal bank account Which of the following does this action describe?
Question 579

Which of the following test describes the risk that is present once mitigations are applied?
Question 580

A security administrator received an alert for a user account with the following log activity:
Which of the following best describes the trigger for the alert the administrator received?
Question