Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SY0-601 CompTIA Security+ Exam with Questions And Answers

Beoordeling
-
Verkocht
-
Pagina's
40
Cijfer
A+
Geüpload op
20-06-2023
Geschreven in
2022/2023

SY0-601 CompTIA Security+ Exam with Questions And Answers.1. A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements? (Select TWO). A. Full-device encryption B. Network usage rules C. Geofencing D. Containerization E. Application whitelisting F. Remote control Answer: A,B 2. Several universities are participating in a collaborative research project and need to share compute and storage resources . Which of the following cloud deployment strategies would BEST meet this need? A. Community B. Private C. Public D. Hybrid Answer: A Explanation: Community cloud storage is a variation of the private cloud storage model, which offers cloud solutions for specific businesses or communities. In this model, cloud storage providers offer their cloud architecture, software and other development tools to meet the requirements of the community. A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. 3. A company recently experienced an attack in which a malicious actor was able to exfiltrate data by cracking stolen passwords, using a rainbow table the sensitive data. Which of the following should a security engineer do to prevent such an attack in the future? A. Use password hashing. B. Enforce password complexity. C. Implement password salting. D. Disable password reuse. Answer: D 4. A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst Include in this documentation? (Select TWO). A. The order of volatility B. A checksum C. The location of the artifacts D. The vendor's name E. The date and time F. A warning banner Answer: A,E 5. Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.) A. Cross-site scripting B. Data exfiltration C. Poor system logging D. Weak encryption E. SQL injection F. Server-side request forgery Answer: D,F 6. Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following: • All users share workstations throughout the day. • Endpoint protection was disabled on several workstations throughout the network. • Travel times on logins from the affected users are impossible. • Sensitive data is being uploaded to external sites. • All user account passwords were forced to be reset and the issue continued. Which of the following attacks is being used to compromise the user accounts?

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

SY0-601
Exam Name: CompTIA Security+ Exam


1. A security analyst needs to implement an MDM solution for BYOD users that will allow the
company to retain control over company emails residing on the devices and limit data
exfiltration that might occur if the devices are lost or stolen.
Which of the following would BEST meet these requirements? (Select TWO).
A. Full-device encryption

,B. Network usage rules
C. Geofencing
D. Containerization
E. Application whitelisting
F. Remote control
Answer: A,B


2. Several universities are participating in a collaborative research project and need to
share compute and storage resources .
Which of the following cloud deployment strategies would BEST meet this
need? A. Community
B. Private
C. Public
D. Hybrid
Answer: A
Explanation:
Community cloud storage is a variation of the private cloud storage model, which offers cloud
solutions for specific businesses or communities. In this model, cloud storage providers offer
their cloud architecture, software and other development tools to meet the requirements of
the community. A community cloud in computing is a collaborative effort in which
infrastructure is shared between several organizations from a specific community with
common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by
a third-party and hosted internally or externally.


3. A company recently experienced an attack in which a malicious actor was able to
exfiltrate data by cracking stolen passwords, using a rainbow table the sensitive data.
Which of the following should a security engineer do to prevent such an attack in the
future? A. Use password hashing.
B. Enforce password complexity.
C. Implement password salting.
D. Disable password reuse.
Answer: D


4. A systems analyst is responsible for generating a new digital forensics chain-of-custody
form. Which of the following should the analyst Include in this documentation? (Select TWO).
A. The order of volatility

,B. A checksum
C. The location of the artifacts
D. The vendor's name
E. The date and time
F. A warning banner
Answer: A,E


5. Which of the following will MOST likely adversely impact the operations of unpatched
traditional programmable-logic controllers, running a back-end LAMP server and OT systems
with human-management interfaces that are accessible over the Internet via a web
interface? (Choose two.)
A. Cross-site scripting
B. Data exfiltration
C. Poor system logging
D. Weak encryption E.
SQL injection
F. Server-side request forgery
Answer: D,F


6. Certain users are reporting their accounts are being used to send unauthorized emails
and conduct suspicious activities.
After further investigation, a security analyst notices the following:
• All users share workstations throughout the day.
• Endpoint protection was disabled on several workstations throughout the network.
• Travel times on logins from the affected users are impossible.
• Sensitive data is being uploaded to external sites.
• All user account passwords were forced to be reset and the issue continued.
Which of the following attacks is being used to compromise the user
accounts? A. Brute-force
B. Keylogger
C. Dictionary
D. Rainbow
Answer: B


7. A technician needs to prevent data loss in a laboratory. The laboratory is not connected
to any external networks.

, Which of the following methods would BEST prevent data? (Select TWO)
A. VPN
B. Drive encryption
C. Network firewall
D. File-level encryption
E. USB blocker
F. MFA
Answer: B,E


8. A smart retail business has a local store and a newly established and growing online
storefront. A recent storm caused a power outage to the business and the local ISP, resulting
in several hours of lost sales and delayed order processing.
The business owner now needs to ensure two
things: * Protection from power outages
* Always-available connectivity In case of an outage
The owner has decided to implement battery backups for the computer
equipment. Which of the following would BEST fulfill the owner's second need?
A. Lease a point-to-point circuit to provide dedicated access.
B. Connect the business router to its own dedicated UPS.
C. Purchase services from a cloud provider for high availability
D Replace the business's wired network with a wireless network.
Answer: C


9. Which of the following would cause a Chief Information Security Officer (CISO) the
MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?
A. An inability to monitor 100%, of every facility could expose the company to unnecessary risk.
B. The cameras could be compromised if not patched in a timely manner.
C. Physical security at the facility may not protect the cameras from theft.
D. Exported videos may take up excessive space on the file servers.
Answer: B


10. A smart switch has the ability to monitor electrical levels and shut off power to a building in
the event of power surge or other fault situation. The switch was installed on a wired network
in a hospital and is monitored by the facilities department via a cloud application. The security
administrator isolated the switch on a separate VLAN and set up a patch routine.
Which of the following steps should also be taken to harden the smart switch?

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
20 juni 2023
Aantal pagina's
40
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
StudyConnect Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
266
Lid sinds
5 jaar
Aantal volgers
232
Documenten
1719
Laatst verkocht
1 maand geleden
Study Connect

Latest Exams, Notes, Practice Tests And All Latest Study Materials to help You Pass your Exams

3.5

40 beoordelingen

5
15
4
7
3
9
2
0
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen