ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 8

List of questions

Question 71

Report Export Collapse

A company uses a drone for precise perimeter and boundary monitoring. Which of the following should be MOST concerning to the company?

Privacy
Privacy
Cloud storage of telemetry data
Cloud storage of telemetry data
GPS spoofing
GPS spoofing
Weather events
Weather events
Suggested answer: A
Explanation:

The use of a drone for perimeter and boundary monitoring can raise privacy concerns, as it may capture video and images of individuals on or near the monitored premises. The company should take measures to ensure that privacy rights are not violated. Reference:

CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 8

asked 02/10/2024
OLUWAGBENRO AFUWAPE
43 questions

Question 72

Report Export Collapse

The security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted files. The analyst has been tasked with determining the infringing source machine and instructed to implement measures to prevent such incidents from occurring again. Which of the following is MOST capable of accomplishing both tasks?

HIDS
HIDS
Allow list
Allow list
TPM
TPM
NGFW
NGFW
Suggested answer: D
Explanation:

Next-Generation Firewalls (NGFWs) are designed to provide advanced threat protection by combining traditional firewall capabilities with intrusion prevention, application control, and other security features. NGFWs can detect and block unauthorized access attempts, malware infections, and other suspicious activity. They can also be used to monitor file access and detect unauthorized copying or distribution of copyrighted material.

A next-generation firewall (NGFW) can be used to detect and prevent copyright infringement by analyzing network traffic and blocking unauthorized transfers of copyrighted material. Additionally, NGFWs can be configured to enforce access control policies that prevent unauthorized access to sensitive resources. Reference:

CompTIA Security+ Study Guide, Exam SY0-601, 4th Edition, Chapter 6

asked 02/10/2024
Jim Balkwill
50 questions

Question 73

Report Export Collapse

A user reports trouble using a corporate laptop. The laptop freezes and responds slowly when writing documents and the mouse pointer occasional disappears.

The task list shows the following results

CompTIA SY0-601 image Question 64 98154 10022024175359000000

Which of the following is MOST likely the issue?

RAT
RAT
PUP
PUP
Spyware
Spyware
Keylogger
Keylogger
Suggested answer: C
Explanation:

Spyware is malicious software that can cause a computer to slow down or freeze. It can also cause the mouse pointer to disappear. The task list shows an application named "spyware.exe" running, indicating that spyware is likely the issue. Reference:

CompTIA Security+ Certification Exam Objectives 6.0: Given a scenario, analyze indicators of compromise and determine the type of malware.

CompTIA Security+ Study Guide, Sixth Edition, pages 125-126

asked 02/10/2024
Vladimir Kornfeld
47 questions

Question 74

Report Export Collapse

Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).

Mantraps
Mantraps
Security guards
Security guards
Video surveillance
Video surveillance
Fences
Fences
Bollards
Bollards
Antivirus
Antivirus
Suggested answer: A, B
Explanation:

A - a mantrap can trap those personnal with bad intension(preventive), and kind of same as detecting, since you will know if someone is trapped there(detective), and it can deter those personnal from approaching as well(deterrent) B - security guards can sure do the same thing as above, preventing malicious personnal from entering(preventive+deterrent), and notice those personnal as well(detective)

asked 02/10/2024
Reneus Martini
39 questions

Question 75

Report Export Collapse

A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business Which of the following constraints BEST describes the reason the findings cannot be remediated?

inability to authenticate
inability to authenticate
Implied trust
Implied trust
Lack of computing power
Lack of computing power
Unavailable patch
Unavailable patch
Suggested answer: D
Explanation:

If the systems are running unsecure protocols and the company that developed them is no longer in business, it is likely that there are no patches available to remediate the issue. Reference:

CompTIA Security+ Certification Exam Objectives 1.6: Given a scenario, implement secure protocols. CompTIA Security+ Study Guide, Sixth Edition, pages 35-36

asked 02/10/2024
Albert Smith
44 questions

Question 76

Report Export Collapse

Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?

ISO 27701
ISO 27701
The Center for Internet Security
The Center for Internet Security
SSAE SOC 2
SSAE SOC 2
NIST Risk Management Framework
NIST Risk Management Framework
Suggested answer: B
Explanation:

The Center for Internet Security (CIS) uses six initial steps that provide basic control over system security, including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments. Reference:

CompTIA Security+ Certification Exam Objectives 1.1: Compare and contrast different types of security concepts.

CompTIA Security+ Study Guide, Sixth Edition, pages 15-16

asked 02/10/2024
Sharon Sandhu
48 questions

Question 77

Report Export Collapse

The Chief Executive Officer announced a new partnership with a strategic vendor and asked the Chief Information Security Officer to federate user digital identities using SAML-based protocols. Which of the following will this enable?

SSO
SSO
MFA
MFA
PKI
PKI
OLP
OLP
Suggested answer: A
Explanation:

Federating user digital identities using SAML-based protocols enables Single Sign-On (SSO), which allows users to log in once and access multiple applications without having to enter their credentials for each one. Reference:

CompTIA Security+ Certification Exam Objectives 1.3: Explain authentication and access controls. CompTIA Security+ Study Guide, Sixth Edition, pages 41-42

asked 02/10/2024
Jose Leonardo
30 questions

Question 78

Report Export Collapse

A company was compromised, and a security analyst discovered the attacker was able to get access to a service account. The following logs were discovered during the investigation:

CompTIA SY0-601 image Question 69 98159 10022024175359000000

Which of the following MOST likely would have prevented the attacker from learning the service account name?

Race condition testing
Race condition testing
Proper error handling
Proper error handling
Forward web server logs to a SIEM
Forward web server logs to a SIEM
Input sanitization
Input sanitization
Suggested answer: D
Explanation:

Input sanitization can help prevent attackers from learning the service account name by removing potentially harmful characters from user input, reducing the likelihood of successful injection attacks.

Reference:

CompTIA Security+ Certification Exam Objectives 2.2: Given a scenario, implement secure coding techniques.

CompTIA Security+ Study Guide, Sixth Edition, pages 72-73

asked 02/10/2024
jaimie lloyd
48 questions

Question 79

Report Export Collapse

The SIEM at an organization has detected suspicious traffic coming a workstation in its internal network. An analyst in the SOC the workstation and discovers malware that is associated with a botnet is installed on the device A review of the logs on the workstation reveals that the privileges of the local account were escalated to a local administrator. To which of the following groups should the analyst report this real-world event?

The NOC team
The NOC team
The vulnerability management team
The vulnerability management team
The CIRT
The CIRT
The read team
The read team
Suggested answer: C
Explanation:

The Computer Incident Response Team (CIRT) is responsible for handling incidents and ensuring that the incident response plan is followed. Reference: CompTIA Security+ Study Guide, Exam SY0-601, Chapter 9

asked 02/10/2024
Lukas Reker
36 questions

Question 80

Report Export Collapse

A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds. Which of the following cryptographic techniques would BEST meet the requirement?

Asymmetric
Asymmetric
Symmetric
Symmetric
Homomorphic
Homomorphic
Ephemeral
Ephemeral
Suggested answer: B
Explanation:

Symmetric encryption allows data to be encrypted and decrypted using the same key. This is useful when the data needs to be accessed and manipulated while still encrypted. Reference: CompTIA Security+ Study Guide, Exam SY0-601, Chapter 6

asked 02/10/2024
J.J. van Ingen
43 questions
Total 603 questions
Go to page: of 61
Search

Related questions