ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 59

Add to Whishlist

List of questions

Question 581

Report Export Collapse

Which of the following test helps to demonstrate integrity during a forensics investigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 582

Report Export Collapse

A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident The systems administrator has just informed investigators that other log files are available for review Which of the following did the administrator most likely configure that will assist the investigators?

Become a Premium Member for full access
  Unlock Premium Member

Question 583

Report Export Collapse

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 584

Report Export Collapse

A company is looking to migrate some servers to the cloud to minimize its technology footprint The company has a customer relationship management system on premises Which of the following solutions will require the least infrastructure and application support from the company?

Become a Premium Member for full access
  Unlock Premium Member

Question 585

Report Export Collapse

In which of the following scenarios is tokenization the best privacy technique to use?

Become a Premium Member for full access
  Unlock Premium Member

Question 586

Report Export Collapse

An organization is concerned about intellectual property theft by employees who leave the organization Which of the following should the organization most likely implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 587

Report Export Collapse

A company uses specially configured workstations for any work that requires administrator privileges to its Tier 0 and Tier 1 systems The company follows a strict process to harden systems immediately upon delivery Even with these strict security measures in place an incident occurred from one of the workstations The root cause appears to be that the SoC was tampered with or replaced Which of the following most likely occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 588

Report Export Collapse

A secondly administration is trying to determine whether a server is vulnerable to a range of attacks After using a tool, the administrator obtains the following output.

CompTIA SY0-601 image Question 579 98669 10022024175400000000

Which of the following attacks was successfully implemented based on the output?

Become a Premium Member for full access
  Unlock Premium Member

Question 589

Report Export Collapse

A financial analyst is expecting an email containing sensitive information from a client. When the email arrives, the analyst receives an error and is unable to open the encrypted message. Which of the following is the most likely cause of the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 590

Report Export Collapse

A security analyst has been reading about a newly discovered cyberattack from a known threat actor Which of the following would best support the analyst's review of the tactics, techniques, and protocols the throat actor was observed using in previous campaigns?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions