This page was exported from Exam for engine [ http://blog.test4engine.com ] Export date:Mon Nov 18 2:26:37 2024 / +0000 GMT ___________________________________________________ Title: Latest CompTIA SY0-601 Free Certification Exam Material with 340 Q&As [Q49-Q71] --------------------------------------------------- Latest CompTIA SY0-601 Free Certification Exam Material with 340 Q&As  UPDATED SY0-601 Exam Questions Certification Test Engine to PDF QUESTION 49Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?  SIEM  CASB  UTM  DLP ExplanationA Cloud access security broker, or CASB, is cloud-hosted software or on-premises software or hardware that act as an intermediary between users and cloud service providers.QUESTION 50A security analyst is hardening a network infrastructure. The analyst is given the following requirements:– Preserve the use of public IP addresses assigned to equipment on thecore router.– Enable “in transport `encryption protection to the web server withthe strongest ciphers.Which of the following should the analyst implement to meet these requirements? (Select TWO).  Configure VLANs on the core router  Configure NAT on the core router  Configure BGP on the core router  Configure AES encryption on the web server  Enable 3DES encryption on the web server  Enable TLSv2 encryption on the web server QUESTION 51An attacker was easily able to log in to a company’s security camera by performing a baste online search for a setup guide for that particular camera brand and model.Which of the following BEST describes the configurations the attacker exploited?  Weak encryption  Unsecure protocols  Default settings  Open permissions QUESTION 52When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?  Acceptance  Mitigation  Avoidance  Transference ExplanationRisk Transference refers to the shifting of the burden of loss for a risk to another party through legislation, contract, insurance or other means. https://www.bcmpedia.org/wiki/Risk_TransferenceQUESTION 53During an incident response, a security analyst observes the following log entry on the web server.Which of the following BEST describes the type of attack the analyst is experience?  SQL injection  Cross-site scripting  Pass-the-hash  Directory traversal QUESTION 54Per company security policy, IT staff members are required to have separate credentials to perform administrative functions using just-in-time permissions.Which of the following solutions is the company Implementing?  Privileged access management  SSO  RADIUS  Attribute-based access control QUESTION 55A user recently entered a username and password into a recruiting application website that had been forged to look like the legitimate site Upon investigation, a security analyst the identifies the following:* The legitimate websites IP address is 10.1.1.20 and eRecruit local resolves to the IP* The forged website’s IP address appears to be 10.2.12.99. based on NetFtow records* AH three at the organization’s DNS servers show the website correctly resolves to the legitimate IP* DNS query logs show one of the three DNS servers returned a result of 10.2.12.99 (cached) at the approximate time of the suspected compromise.Which of the following MOST likely occurred?  A reverse proxy was used to redirect network traffic  An SSL strip MITM attack was performed  An attacker temporarily pawned a name server  An ARP poisoning attack was successfully executed QUESTION 56Developers are about to release a financial application, but the number of fields on the forms that could be abused by an attacker is troubling.Which of the following techniques should be used to address this vulnerability?  Implement input validation  Encrypt data Before submission  Perform a manual review  Conduct a peer review session QUESTION 57A security engineer is setting up passwordless authentication for the first time.INSTRUCTIONSUse the minimum set of commands to set this up and verify that it works. Commands cannot be reused.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. QUESTION 58A cybersecurity administrator needs to allow mobile BYOD devices to access network resources.As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).  Create a new network for the mobile devices and block the communication to the internal network and servers  Use a captive portal for user authentication.  Authenticate users using OAuth for more resiliency  Implement SSO and allow communication to the internal network  Use the existing network and allow communication to the internal network and servers.  Use a new and updated RADIUS server to maintain the best solution QUESTION 59Which of the following environments minimizes end user disruption and is MOST likely to be used to assess the impacts of any database migrations or major system changes by using the final version of the code in an operationally representative environment?  Staging  Test  Production  Development A staging environment is used to validate code that will be deployed. I have seen you providing answers with no context behind them and being wrong. You need to stop that.QUESTION 60While reviewing an alert that shows a malicious request on one web application, a cybersecurity analyst is alerted to a subsequent token reuse moments later on a different service using the same single sign-on method.Which of the following would BEST detect a malicious actor?  Utilizing SIEM correlation engines  Deploying Netflow at the network border  Disabling session tokens for all sites  Deploying a WAF for the web server ExplanationThe initial compromise was a malicious request on a web server. Moments later the token created with SSO was used on another service, the question does not specify what type of service. Deploying a WAF on the web server will detect the attacker but only on that server. If the attacker issues the same malicious request to get another SSO token correlating that event with using that SSO token in other services would allows to detect the malicious activity.QUESTION 61A company’s Chief Information Security Officer (CISO) recently warned the security manager that the company’s Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?  Hacktivists  White-hat hackers  Script kiddies  Insider threats Hacktivists – “a person who gains unauthorized access to computer files or networks in order to further social or political ends.”QUESTION 62A security analyst is configuring a large number of new company-issued laptops. The analyst received the following requirements:* The devices will be used internationally by staff who travel extensively.* Occasional personal use is acceptable due to the travel requirements.* Users must be able to install and configure sanctioned programs and productivity suites.* The devices must be encrypted* The devices must be capable of operating in low-bandwidth environments.Which of the following would provide the GREATEST benefit to the security posture of the devices?  Configuring an always-on VPN  Implementing application whitelisting  Requiring web traffic to pass through the on-premises content filter  Setting the antivirus DAT update schedule to weekly Explanationhttps://docs.microsoft.com/en-us/windows-server/remote/remote-access/vpn/always-on-vpn/always-on-vpn-technQUESTION 63A security researching is tracking an adversary by noting its attack and techniques based on its capabilities, infrastructure, and victims. Which of the following is the researcher MOST likely using?  The Diamond Model of intrusion Analysis  The Cyber Kill Chain  The MITRE CVE database  The incident response process QUESTION 64An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following:Which of the following BEST describes the attack that was attempted against the forum readers?  SOU attack  DLL attack  XSS attack  API attack QUESTION 65A security analyst sees the following log output while reviewing web logs:Which of the following mitigation strategies would be BEST to prevent this attack from being successful?  Secure cookies  Input validation  Code signing  Stored procedures QUESTION 66During an investigation, a security manager receives notification from local authorities mat company proprietary data was found on a former employees home computer, The former employee’s corporate workstation has since been repurposed, and the data on the hard drive has been overwritten Which of the following would BEST provide the security manager with enough details to determine when the data was removed from the company network?  Properly congured hosts with security logging  Properly congured endpoint security tool with darting  Properly congured SIEM with retention policies  Properly congured USB blocker with encryption QUESTION 67Acritical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity and handle two simultaneous disk failures. Which of the following RAID levels meets this requirements?  RAID0+1  RAID 2  RAID 5  RAID 6 QUESTION 68Users at organization have been installing programs from the internet on their workstations without first proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function property. Which of the following should the security administrator consider implementing to address this issue?  Application code signing  Application whitellsting  Data loss prevention  Web application firewalls Application whitelisting is the practice of specifying an index of approved software applications or executable files that are permitted to be present and active on a computer system. The goal of whitelisting is to protect computers and networks from potentially harmful applications. In general, a whitelist is an index of approved entities. In information security (infosec), whitelisting works best in centrally managed environments, where systems are subject to a consistent workload. https://searchsecurity.techtarget.com/definition/application-whitelistingQUESTION 69Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?  MOU  MTTR  SLA  NDA ExplanationService level agreement (SLA). An SLA is an agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels.QUESTION 70A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)  Dual power supply  Off-site backups  Automatic OS upgrades  NIC teaming  Scheduled penetration testing  Network-attached storage Explanationhttps://searchdatacenter.techtarget.com/definition/resiliencyQUESTION 71A grocery store is expressing security and reliability concerns regarding the on-site backup strategy currently being performed by locally attached disks. The main concerns are the physical security of the backup media and the durability of the data stored on these devices.Which of the following is a cost-effective approach to address these concerns?  Enhance resiliency by adding a hardware RAID.  Move data to a tape library and store the tapes off site  Install a local network-attached storage.  Migrate to a cloud backup solution  Loading … Exam Prerequisites While the Security+ renders multiple benefits and helps a security specialist to have an amazing career start, it doesn't impose strict prerequisites. Officially, there are zero prerequisites. However, industry experts and candidates, who have already experienced the CompTIA SY0-601 exam, advise to take up the Network N10-007 exam first. This test imparts some basic yet vital cybersecurity-related knowledge that will make the journey of SY0-601 an easy task.   Get The Important Preparation Guide With SY0-601 Dumps: https://www.test4engine.com/SY0-601_exam-latest-braindumps.html --------------------------------------------------- Images: https://blog.test4engine.com/wp-content/plugins/watu/loading.gif https://blog.test4engine.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-11-09 13:31:17 Post date GMT: 2022-11-09 13:31:17 Post modified date: 2022-11-09 13:31:17 Post modified date GMT: 2022-11-09 13:31:17