ExamGecko
Home / CompTIA / SY0-601 / List of questions
Ask Question

CompTIA SY0-601 Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report Export Collapse

A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?

laC
laC
MSSP
MSSP
Containers
Containers
SaaS
SaaS
Suggested answer: A
Explanation:

laaS (Infrastructure as a Service) allows the creation of virtual networks, automation, and scripting to reduce the area utilized in a datacenter. Reference: CompTIA Security+ Study Guide, Exam SY0- 601, Chapter 4

asked 02/10/2024
Kameron Katoku
50 questions

Question 82

Report Export Collapse

A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks. Which of the following would be the BEST control for the company to require from prospective vendors?

IP restrictions
IP restrictions
Multifactor authentication
Multifactor authentication
A banned password list
A banned password list
A complex password policy
A complex password policy
Suggested answer: B
Explanation:

Multifactor authentication (MFA) would be the best control to require from a third-party identity provider to help mitigate attacks such as credential theft and brute-force attacks. Reference:

CompTIA Security+ Study Guide, Exam SY0-601, Chapter 2

asked 02/10/2024
Kamal maru
45 questions

Question 83

Report Export Collapse

An organization wants to integrate its incident response processes into a workflow with automated decision points and actions based on predefined playbooks. Which of the following should the organization implement?

SIEM
SIEM
SOAR
SOAR
EDR
EDR
CASB
CASB
Suggested answer: B
Explanation:

Security Orchestration, Automation, and Response (SOAR) should be implemented to integrate incident response processes into a workflow with automated decision points and actions based on predefined playbooks. Reference: CompTIA Security+ Study Guide, Exam SY0-601, Chapter 9

asked 02/10/2024
Bob Xiong
47 questions

Question 84

Report Export Collapse

A bad actor tries to persuade someone to provide financial information over the phone in order to gain access to funds. Which of the following types of attacks does this scenario describe?

Vishing
Vishing
Phishing
Phishing
Spear phishing
Spear phishing
Whaling
Whaling
Suggested answer: A
Explanation:

Vishing is a social engineering attack that uses phone calls or voicemail messages to trick people into divulging sensitive information, such as financial information or login credentials.

asked 02/10/2024
Jessica Martinada
39 questions

Question 85

Report Export Collapse

Which of the following must be in place before implementing a BCP?

SLA
SLA
AUP
AUP
NDA
NDA
BIA
BIA
Suggested answer: D
Explanation:

A Business Impact Analysis (BIA) is a critical component of a Business Continuity Plan (BCP). It identifies and prioritizes critical business functions and determines the impact of their disruption.

Reference: CompTIA Security+ Study Guide 601, Chapter 10

asked 02/10/2024
Claudious Utete
44 questions

Question 86

Report Export Collapse

A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles should the developer configure to meet these requirements? (Select TWO).

Identity processor
Identity processor
Service requestor
Service requestor
Identity provider
Identity provider
Service provider
Service provider
Tokenized resource
Tokenized resource
Notarized referral
Notarized referral
Suggested answer: C, D
Explanation:

An identity provider (IdP) is responsible for authenticating users and generating security tokens containing user information. A service provider (SP) is responsible for accepting security tokens and granting access to resources based on the user's identity.

asked 02/10/2024
Fabio Zannetti
44 questions

Question 87

Report Export Collapse

An organization wants seamless authentication to its applications. Which of the following should the organization employ to meet this requirement?

SOAP
SOAP
SAML
SAML
SSO
SSO
Kerberos
Kerberos
Suggested answer: C
Explanation:

Single Sign-On (SSO) is a mechanism that allows users to access multiple applications with a single set of login credentials. Reference: CompTIA Security+ Study Guide 601, Chapter 6

asked 02/10/2024
Jesus Vargas
57 questions

Question 88

Report Export Collapse

A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?

Containment
Containment
Identification
Identification
Recovery
Recovery
Preparation
Preparation
Suggested answer: B
Explanation:

Vulnerability scanning is a proactive security measure used to identify vulnerabilities in the network and systems. Reference: CompTIA Security+ Study Guide 601, Chapter 4

asked 02/10/2024
Khaled Fouad
35 questions

Question 89

Report Export Collapse

A security engineer needs to build @ solution to satisfy regulatory requirements that stale certain critical servers must be accessed using MFA However, the critical servers are older and are unable to support the addition of MFA, Which of te following will the engineer MOST likely use to achieve this objective?

A forward proxy
A forward proxy
A stateful firewall
A stateful firewall
A jump server
A jump server
A port tap
A port tap
Suggested answer: C
Explanation:

A jump server is a secure host that allows users to access other servers within a network. The jump server acts as an intermediary, and users can access other servers via the jump server after authenticating with MFA.

asked 02/10/2024
antonio de simone
44 questions

Question 90

Report Export Collapse

Which of the following environments would MOST likely be used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics?

Test
Test
Staging
Staging
Development
Development
Production
Production
Suggested answer: A
Explanation:

The test environment is used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics. Reference: CompTIA Security+ Study Guide 601, Chapter 2

asked 02/10/2024
Anu V
47 questions
Total 603 questions
Go to page: of 61
Search

Related questions