ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 60

Add to Whishlist

List of questions

Question 591

Report Export Collapse

A wet-known organization has been experiencing attacks from APTs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB stocks that are dropped in parking lots. Which of the following is the best defense against this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 592

Report Export Collapse

A dynamic application vulnerability scan identified that code injection could be performed using a web form. Which of the following will be the best remediation to prevent this vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 593

Report Export Collapse

Security analysts are conducting an investigation of an attack that occurred inside the organization's network. An attacker was able to coiled network traffic between workstations throughout the network The analysts review the following logs:

CompTIA SY0-601 image Question 584 98674 10022024175400000000

The Layer 2 address table has hundreds of entries similar to the ones above Which of the following attacks has most likely occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 594

Report Export Collapse

A security analyst has been tasked with ensuring all programs that are deployed into the enterprise have been assessed in a runtime environment Any critical issues found in the program must be sent back to the developer for verification and remediation. Which of the following lost describes the type of assessment taking place?

Become a Premium Member for full access
  Unlock Premium Member

Question 595

Report Export Collapse

A security engineer must deploy two wireless routers in an office suite Other tenants in the office building should not be able to connect to this wireless network Which of the following protocols should the engineer implement to ensure the strongest encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 596

Report Export Collapse

A company currently uses passwords for logging in to company-owned devices and wants to add a second authentication factor Per corporate policy, users are not allowed to have smartphones at their desks Which of the following would meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 597

Report Export Collapse

An organization is having difficulty correlating events from its individual AV. EDR. DLP. SWG. WAF, MDM. HIPS, and CASB systems. Which of the following is the best way to improve the situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 598

Report Export Collapse

An engineer is setting up a VDI environment for a factory location, and the business wants to deploy a low-cost solution to enable users on the shop floor to log in to the VDI environment directly. Which of the following should the engineer select to meet these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 599

Report Export Collapse

A security analyst receives a SIEM alert that someone logged in to the app admin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log:

CompTIA SY0-601 image Question 590 98680 10022024175400000000

Which of the following can the security analyst conclude?

Become a Premium Member for full access
  Unlock Premium Member

Question 600

Report Export Collapse

Which of the following is an administrative control that would be most effective to reduce the occurrence of malware execution?

Become a Premium Member for full access
  Unlock Premium Member
Total 603 questions
Go to page: of 61
Search

Related questions