SY0-601 v3 - Active untill 4 NOV 21
Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?
Shut down the VDI and copy off the event logs.
Take a memory snapshot of the running system.
Use NetFlow to identify command-and-control IPs.
Run a full on-demand scan of the root volume.
Users are presented with a banner upon each login to a workstation. The banner mentions that users are not entitled to any reasonable expectation of privacy and access is for authorized personnel only. In order to proceed past that banner, users must click the OK button.
Which of the following is this an example of?
AUP
NDA
SLA
MOU
The Chief Information Security Officer is concerned about employees using personal email rather than company email to communicate with clients and sending sensitive business information and Pll.
Which of the following would be the BEST solution to install on the employees’ workstations to prevent information from leaving the company's network?
HIPS
DLP
HIDS
EDR
On the way into a secure building, an unknown individual strikes up a conversation with an employee. The employee scans the required badge at the door while the unknown individual holds the door open, seemingly out of courtesy, for the employee.
Which of the following social engineering techniques is being utilized?
Shoulder surfing
Watering-hole attack
Tailgating
Impersonation
Two hospitals merged into a single organization. The privacy officer requested a review of all records to ensure encryption was used during record storage, in compliance with regulations. During the review, the officer discovered that medical diagnosis codes and patient names were left unsecured.
Which of the following types of data does this combination BEST represent?
Personal health information
Personally identifiable information
Tokenized data
Proprietary data
A company discovered that terabytes of data have been exfiltrated over the past year after an employee clicked on an email link. The threat continued to evolve and remain undetected until a security analyst noticed an abnormal amount of external connections when the employee was not working.
Which of the following is the MOST likely threat actor?
Shadow IT
Script kiddies
APT
Insider threat
An untrusted SSL certificate was discovered during the most recent vulnerability scan. A security analyst determines the certificate is signed properly and is a valid wildcard. This same certificate is installed on the other company servers without issue.
Which of the following is the MOST likely reason for this finding?
The required intermediate certificate is not loaded as part of the certificate chain.
The certificate is on the CRL and is no longer valid.
The corporate CA has expired on every server, causing the certificate to fail verification.
The scanner is incorrectly configured to not trust this certificate when detected on the server.
A company wants to improve end users’ experiences when they log in to a trusted partner website. The company does not want the users to be issued separate credentials for the partner website.
Which of the following should be implemented to allow users to authenticate using their own credentials to log in to the trusted partner's website?
Directory service
AAA server
Federation
Multifactor authentication
A company is under investigation for possible fraud. As part of the investigation, the authorities need to review all emails and ensure data is not deleted.
Which of the following should the company implement to assist in the investigation?
Legal hold
Chain of custody
Data loss prevention
Content filter
A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully.
Which of the following BEST describes the policy that is being implemented?
Time-based logins
Geofencing
Network location
Password history
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage.
Which of the following BEST describes these threat actors?
Semi-authorized hackers
State actors
Script kiddies
Advanced persistent threats
A company is required to continue using legacy software to support a critical service.
Which of the following BEST explains a risk of this practice?
Default system configuration
Unsecure protocols
Lack of vendor support
Weak encryption
A security analyst has been tasked with ensuring all programs that are deployed into the enterprise have been assessed in a runtime environment. Any critical issues found in the program must be sent back to the developer for verification and remediation.
Which of the following BEST describes the type of assessment taking place.
Input validation
Dynamic code analysis
Fuzzing
Manual code review
Which of the following can work as an authentication method and as an alerting mechanism for unauthorized access attempts.
Smart card
Push notifications
Attestation service
HMAC-based
One-time password
A company has a flat network in the cloud. The company needs to implement a solution to segment its production and non-production servers without migrating servers to a new network.
Which of the following solutions should the company implement?
Intranet
Screened subnet
VLAN Segmentation
Zero trust
The president of a regional bank likes to frequently provide SOC tours to potential investors.
Which of the following policies BEST reduces the risk of malicious activity occurring after a tour?
Password complexity
Acceptable use
Access control
Clean desk
A Chief Information Security Officer has defined resiliency requirements for a new data center architecture. The requirements are as follows:
- Critical fileshares will remain accessible during and after a natural disaster.
- Five percent of hard disks can fail at any given time without impacting the data.
- Systems will be forced to shut down gracefully when battery levels are below 20%.
Which of the following are required to BEST meet these objectives? (Choose three.)
Fiber switching
LaC
NAS
RAID
UPS
Redundant power supplies
Geographic dispersal
Snapshots
Load balancing
Which of the following is a security best practice that ensures the integrity of aggregated log files within a SIEM?
Set up hashing on the source log file servers that complies with local regulatory requirements.
Back up the aggregated log files at least two times a day or as stated by local regulatory requirements.
Write protect the aggregated log files and move them to an isolated server with limited access.
Back up the source log files and archive them for at least six years or in accordance with local regulatory requirements.
A security analyst is evaluating the risks of authorizing multiple security solutions to collect data from the company's cloud environment.
Which of the following is an immediate consequence of these integrations?
Non-compliance with data sovereignty rules
Loss of the vendors interoperability support
Mandatory deployment of a SIEM solution
Increase in the attack surface
Which of the following explains why RTO is included in a BIA?
It identifies the amount of allowable downtime for an application or system.
It prioritizes risks so the organization can allocate resources appropriately.
It monetizes the loss of an asset and determines a break-even point for risk mitigation.
It informs the backup approach so that the organization can recover data to a known time.
A security analyst is reviewing web-application logs and finds the following log:
https://www.comptia.org/contact-us/%3Ffile%3D..%2F..%2F..%2Fetc%2Fpasswd
Which of the following attacks is being observed?
Directory traversal
XSS
CSRF
On-path attack
A security analyst is reviewing the vulnerability scan report for a web server following an incident. The vulnerability that was used to exploit the server is present in historical vulnerability scan reports, and a patch is available for the vulnerability.
Which of the following is the MOST likely cause?
Security patches were uninstalled due to user impact.
An adversary altered the vulnerability scan reports
A zero-day vulnerability was used to exploit the web server
The scan reported a false negative for the vulnerability
Which of the following is a known security risk associated with data archives that contain financial information?
Data can become a liability if archived longer than required by regulatory guidance.
Data must be archived off-site to avoid breaches and meet business requirements.
Companies are prohibited from providing archived data to e-discovery requests.
Unencrypted archives should be preserved as long as possible and encrypted.
Which of the following BEST describes the process of documenting who has access to evidence.
Order of volatility
Chain of custody
Non-repudiation
Admissibility
A systems engineer want to leverage a cloud-based architecture with low latency between network-connected devices that also reduces the bandwidth that is required by performing analytics directly on the endpoints.
Which of the following would BEST meet the requirements? (Choose two.)
Private cloud
SaaS
Hybrid cloud
IaaS
BDRaaS
Fog computing
Which of the following is a policy that provides a greater depth and breadth of knowledge across an organization?
Asset management policy
Separation of duties policy
Acceptable use policy
Job rotation policy
A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information.
Which of the following would BEST meet these objectives?
WAF
CASB
VPN
TLS
A security analyst is tasked with defining the "something you are" factor of the company's MFA settings.
Which of the following is BEST to use to complete the configuration?
Gait analysis
Vein
Soft token
HMAC-based, one-time password
Which of the following processes will eliminate data using a method that will allow the storage device to be reused after the process is complete?
Pulverizing
Overwriting
Shredding
Degaussing
A user's account is constantly being locked out. Upon further review, a security analyst found the following in the SIEM:
Time Log Message
9:00:00 AM login: user password: aBG23TMV
9:00:01 AM login: user password: aBG33TMV
9:00:02 AM login: user password: aBG43TMV
9:00:03 AM login: user password: aBG53TMV
9:00:00 AM login: user password: aBG23TMV
9:00:01 AM login: user password: aBG33TMV
9:00:02 AM login: user password: aBG43TMV
9:00:03 AM login: user password: aBG53TMV
Which of the following describes what is occurring?
An attacker is utilizing a password-spraying attack against the account.
An attacker is utilizing a dictionary attack against the account.
An attacker is utilizing a brute-force attack against the account.
An attacker is utilizing a rainbow table attack against the account.
A web server has been compromised due to a ransomware attack. Further investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible.
Which of the following should the administrator use to restore services to a secure state?
The last incremental backup that was conducted 72 hours ago
The last known-good configuration
The last full backup that was conducted seven days ago
The baseline OS configuration
A network engineer created two subnets that will be used for production and development servers. Per security policy production and development servers must each have a dedicated network that cannot communicate with one another directly.
Which of the following should be deployed so that server administrators can access these devices?
VLANs
Internet proxy servers
NIDS
Jump servers
A social media company based in North America is looking to expand into new global markets and needs to maintain compliance with international standards.
With which of the following is the company's data protection officer MOST likely concerned?
NIST Framework
ISO 27001
GDPR
PCI-DSS
A security architect is required to deploy to conference rooms some workstations that will allow sensitive data to be displayed on large screens. Due to the nature of the data, it cannot be stored in the conference rooms. The file share is located in a local data center.
Which of the following should the security architect recommend to BEST meet the requirement?
Fog computing and KVMs
VDI and thin clients
Private cloud and DLP
Full drive encryption and thick clients
A Chief Information Security Officer wants to ensure the organization is validating and checking the integrity of zone transfers.
Which of the following solutions should be implemented?
DNSSEC
LDAPS
NGFW
DLP
Which of the following controls is used to make an organization initially aware of a data compromise?
Protective
Preventative
Corrective
Detective
An annual information security assessment has revealed that several OS-level configurations are not in compliance due to outdated hardening standards the company is using.
Which of the following would be BEST to use to update and reconfigure the OS-level security configurations?
CIS benchmarks
GDPR guidance
Regional regulations
ISO 27001 standards
A company acquired several other small companies. The company that acquired the others is transitioning network services to the cloud. The company wants to make sure that performance and security remain intact.
Which of the following BEST meets both requirements?
High availability
Application security
Segmentation
Integration and auditing
After a recent external audit, the compliance team provided a list of several non-compliant, in-scope hosts that were not encrypting cardholder data at rest.
Which of the following compliance frameworks would address the compliance team's GREATEST concern?
PCI DSS
GDPR
ISO 27001
NIST CSF
A security analyst is receiving several alerts per user and is trying to determine if various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise.
Which of the following actions should the security analyst perform?
Adjust the data flow from authentication sources to the SIEM.
Disable email alerting and review the SIEM directly.
Adjust the sensitivity levels of the SIEM correlation engine.
Utilize behavioral analysis to enable the SIEM's learning mode.
Which of the following is the MOST effective way to detect security flaws present on third-party libraries embedded on software before it is released into production?
Employ different techniques for server- and client-side validations
Use a different version control system for third-party libraries
Implement a vulnerability scan to assess dependencies earlier on SDLC
Increase the number of penetration tests before software release
Which of the following prevents an employee from seeing a colleague who is visiting an inappropriate website?
Job rotation policy
NDA
AUP
Separation of duties policy
A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check FIRST?
DNS
Message gateway
Network
Authentication
An attacker has determined the best way to impact operations to infiltrate third-party software vendors.
Which of the following vectors is being exploited.
Social media
Cloud
Supply chain
Social engineering
An organization would like to give remote works the ability to use applications hosted inside the corporate network. Users will be allowed to use their personal computers, or they will be provided an organization asset. Either way, no data or application will be installed locally or any user systems.
Which of the following mobile solutions would accomplish these goals.
VDI
MDM
COPE
UTM
Which of the following is used to ensure that the evidence is admissible in legal proceedings when it is collected and provided to the authorities?
Chain of custody
Legal hold
Event log
Artifacts
The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact.
Which of the following BEST meets the requirements?
Warm site failover
Tabletop walk-through
Parallel path testing
Full outage simulation
Which of the following control types fixes a previously identified issue and mitigates a risk?
Detective
Corrective
Preventative
Finalized
An analyst is reviewing logs associated with an attack. The logs indicate an attacker downloaded a malicious file that was quarantined by the AV solution. The attacker utilized a local non-administrative account to restore the malicious file to a new location. The file was then used by another process to execute a payload.
Which of the following attacks did the analyst observe?
Privilege escalation
Request forgeries
Injection
Replay attack
A security engineer must deploy two wireless routers in an office suite. Other tenants in the office building should not be able to connect to this wireless network.
Which of the following protocols should the engineer implement to ensure the STRONGEST encryption?
WPS
WPA2
WAP
HTTPS
An attacker browses a company's online job board attempting to find any relevant information regarding the technologies the company uses.
Which of the following BEST describes this social engineering technique?
Hoax
Reconnaissance
Impersonation
Pretexting
During an incident response process involving a laptop, a host was identified as the entry point for malware. The management team would like to have the laptop restored and given back to the user. The cybersecurity analyst would like to continue investigating the intrusion on the host.
Which of the following would allow the analyst to continue the investigation and also return the laptop to the user as soon as possible?
Dd
Memdump
Tcpdump
Head
An analyst is trying to identify insecure services that are running on the internal network. After performing a port scan, the analyst identifies that a server has some insecure services enabled on default ports.
Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them? (Choose three.)
SFTP, FTPS
SNMPv2, SNMPv3
HTTP, HTTPS
TFTP, FTP
SNMPv1, SNMPv2
Telnet, SSH
TLS, SSL
POP, IMAP
Login, rlogin
A security analyst needs to produce a document that details how a security incident occurred, the steps that were taken for recovery, and how future incidents can be avoided.
During which of the following stages of the response process will this activity take place?
Recovery
Identification
Lessons learned
Preparation
An administrator is configuring a firewall rule set for a subnet to only access DHCP, web pages, and SFTP, and to specifically block FTP.
Which of the following would BEST accomplish this goal
[Permission | Source | Destination | Port] |
Allow: |
Any
|
Any | 80- |
Allow: | Any | Any | 443- |
Allow: | Any | Any | 67- |
Allow: | Any | Any | 68- |
Allow: | Any | Any | 22- |
Deny: | Any | Any | 21- |
Deny: | Any | Any |
[Permission | Source | Destination | Port] |
Allow: |
Any
|
Any | 80- |
Allow: | Any | Any | 443- |
Allow: | Any | Any | 67- |
Allow: | Any | Any | 68- |
Deny: | Any | Any | 22- |
Allow: | Any | Any | 21- |
Deny: | Any | Any |
[Permission | Source | Destination | Port] |
Allow: |
Any
|
Any | 80- |
Allow: | Any | Any | 443- |
Allow: | Any | Any | 22- |
Deny: | Any | Any | 67- |
Deny: | Any | Any | 68- |
Deny: | Any | Any | 21- |
Allow: | Any | Any |
[Permission | Source | Destination | Port] |
Allow: |
Any
|
Any | 80- |
Allow: | Any | Any | 443- |
Deny: | Any | Any | 67- |
Allow: | Any | Any | 68- |
Allow: | Any | Any | 22- |
Allow: | Any | Any | 21- |
Allow: | Any | Any |
While investigating a recent security incident, a security analyst decides to view all network connections on a particular server.
Which of the following would provide the desired information?
Arp
Nslookup
Netstat
Nmap
A company recently decided to allow its employees to use their personally owned devices for tasks like checking email and messaging via mobile applications. The company would like to use MDM, but employees are concerned about the loss of personal data.
Which of the following should the IT department implement to BEST protect the company against company data loss while still addressing the employees’ concerns?
Enable the remote-wiping option in the MDM software in the case the phone is stolen.
Configure the MDM software to enforce the use of PINs to access the phone.
Configure MDM for FDE without enabling the lock screen.
Perform a factory reset on the phone before installing the company’s applications.
The concept of connecting a user account across the systems of multiple enterprises is BEST known as:
Federation
A remote access policy
Multi-factor authentication
Single sign-on
A user received an SMS on a mobile phone that asked for bank details.
Which of the following social-engineering techniques was used in this case?
SPIM
Vishing
Spear phishing
Smishing
A company is working on mobile device security after a report revealed that users granted non-verified software access to corporate data.
Which of the following is the MOST effective security control to mitigate this risk?
Block access to application stores
Implement OTA updates
Update the BYOD policy
Deploy a uniform firmware
A security analyst needs to implement security features across smartphones, laptops, and tablets.
Which of the following would be the MOST effective across heterogeneous platforms?
Enforcing encryption
Deploying GPOs
Removing administrative permissions
Applying MDM software
The new Chief Information Security Officer at a company has asked the security team to implement stronger user account policies. The new policies require:
- Users to choose a password unique to their last ten passwords
- Users to not log in from certain high-risk countries.
Which of the following should the security team implement? (Choose two.)
Password complexity
Password history
Geolocation
Geofencing
Geotagging
Password reuse
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
SSAE SOC 2
PCI DSS
GDPR
ISO 31000
Which of the following is MOST likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented.
An RTO report
A risk register
A business impact analysis
An asset value register
A disaster recovery plan
A worldwide manufacturing company has been experiencing email account compromises. In one incident, a user logged in from the corporate office in France, but then seconds later, the same user account attempted a login from Brazil.
Which of the following account policies would BEST prevent this type of attack?
Network location
Impossible travel time
Geolocation
Geofencing
A new vulnerability in the SMB protocol on the Windows systems was recently discovered, but no patches are currently available to resolve the issue. The security administrator is concerned that servers in the company’s DMZ will be vulnerable to external attack; however, the administrator cannot disable the service on the servers, as SMB is used by a number of internal systems and applications on the LAN.
Which of the following TCP ports should be blocked for all external inbound connections to the DMZ as a workaround to protect the servers? (Choose two.)
135
139
143
161
443
445
A recent phishing campaign resulted in several compromised user accounts. The security incident response team has been tasked with reducing the manual labor of filtering through all the phishing emails as they arrive and blocking the sender's email address, along with other time consuming mitigation actions.
Which of the following can be configured to streamline those tasks?
SOAR playbook
MDM policy
Firewall rules
URL filter
SIEM data collection
A penetration tester is brought on site to conduct a full attack simulation at a hospital. The penetration tester notices a WAP that is hanging from the drop ceiling by its cabling and is reachable.
Which of the following recommendations would the penetration tester MOST likely make given this observation?
Employ a general contractor to replace the drop-ceiling tiles.
Place the network cabling inside a secure conduit.
Secure the access point and cabling inside the drop ceiling.
Utilize only access points that have internal antennas
Which of the following techniques eliminates the use of rainbow tables for password cracking?
Hashing
Tokenization
Asymmetric encryption
Salting
During a security assessment, a security analyst finds a file with overly permissive permissions.
Which of the following tools will allow the analyst to reduce the permissions for the existing users and groups and remove the set-user-ID bit from the file?
Ls
Chflags
Chmod
Lsof
Setuid
A network administrator is concerned about users being exposed to malicious content when accessing company cloud applications. The administrator wants to be able to block access to sites based on the AUP. The users must also be protected because many of them work from home or at remote locations, providing on-site customer support.
Which of the following should the administrator employ to meet these criteria?
Implement NAC.
Implement an SWG.
Implement a URL filter.
Implement an MDM.
A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process.
Which of the following methods would BEST accomplish this goal?
Salting the magnetic strip information
Encrypting the credit card information in transit
Hashing the credit card numbers upon entry
Tokenizing the credit cards in the database
Which of the following supplies non-repudiation during a forensics investigation?
Dumping volatile memory contents first
Duplicating a drive with dd
Using a SHA-2 signature of a drive image
Logging everyone in contact with evidence
Encrypting sensitive data
A security analyst is tasked with classifying data to be stored on company servers.
Which of the following should be classified as proprietary?
Customers’ dates of birth
Customers’ email addresses
Marketing strategies
Employee salaries
Which of the following holds staff accountable while escorting unauthorized personnel?
Locks
Badges
Cameras
Visitor logs
An organization’s Chief Security Officer (CSO) wants to validate the business’s involvement in the incident response plan to ensure its validity and thoroughness.
Which of the following will the CSO MOST likely use?
An external security assessment
A bug bounty program
A tabletop exercise
A red-team engagement
Which of the following documents provides guidance regarding the recommended deployment of network security systems from the manufacturer?
Cloud control matrix
Reference architecture
NIST RMF
CIS Top 20
During a recent security assessment, a vulnerability was found in a common OS. The OS vendor was unaware of the issue and promised to release a patch within the next quarter.
Which of the following BEST describes this type of vulnerability?
Legacy operating system
Weak configuration
Zero day
Supply chain
Which of the following is a targeted attack aimed at compromising users within a specific industry or group?
Watering hole
Typosquatting
Hoax
Impersonation
To reduce and limit software and infrastructure costs, the Chief Information Officer has requested to move email services to the cloud. The cloud provider and the organization must have security controls to protect sensitive data.
Which of the following cloud services would BEST accommodate the request?
IaaS
PaaS
DaaS
SaaS
A security engineer is concerned that the strategy for detection on endpoints is too heavily dependent on previously defined attacks. The engineer would like a tool to monitor for changes to key files and network traffic on the device.
Which of the following tools BEST addresses both detection and prevention?
NIDS
HIPS
AV
NGFW
During a recent incident, an external attacker was able to exploit SMB vulnerability over the internet. Which of the following action items should a security analyst perform FIRST to prevent this from occurring again.
Check for any recent SMB CVEs .
Install AV of the affected server.
Block unneeded TCP 445 connections.
Deploy a NIDS in the affected subnet.
A penetration tester is fuzzing an application to identify where the EIP (Extended Instruction Pointer) of the stack is located on memory.
Which of the following attacks is the penetration tester planning to execute
Race-condition
Pass-the-hash
Buffer overflow
XSS
Server administrators want to configure a cloud solution so that computing memory and processor usage is maximized most efficiently across a number of virtual servers. They also need to avoid potential denial-of-service situations caused by availability.
Which of the following should administrators configure to maximize system availability while efficiently utilizing available computing power?
Dynamic resource allocation
High availability
Segmentation
Container security
While reviewing the wireless router, a systems administrator of a small business determines someone is spoofing the MAC address of an authorized device. Given the table below:
Hostname | IP address | MAC | MAC filter |
PC1 | 192.168.1.20 | 00:1E:1B:43:21:B2 | On |
PC2 | 192.168.1.23 | 31:1C:3C:13:25:C4 | Off |
PC3 | 192.168.1.25 | 20:A2:22:45:11:D2 | On |
UNKNOWN | 192.168.1.21 | 12:44:B2:FF:A1:22 | Off |
Which of the following should be the administrator’s NEXT step to detect if there is a rogue system without impacting availability?
Conduct a ping sweep,
Physically check each system.
Deny internet access to the "UNKNOWN" hostname.
Apply MAC filtering.
A security analyst in a SOC has been tasked with onboarding a new network into the SIEM.
Which of the following BEST describes the information that should feed into a SIEM solution in order to adequately support an investigation?
Logs from each device type and security layer to provide correlation of events
Only firewall logs since that is where attackers will most likely try to breach the network
Email and web-browsing logs because user behavior is often the cause of security breaches
NetFlow because it is much more reliable to analyze than syslog and will be exportable from every device
An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities.
Which of the following is being implemented?
Proximity cards with guards
Fence with electricity
Drones with alarms
Motion sensors with signage
An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance.
Which of the following is the MOST efficient approach to perform the analysis?
Provide a domain parameter to theHarvester tool.
Check public DNS entries using dnsenum.
Perform a Nessus vulnerability scan targeting a public company’s IP.
Execute nmap using the options: scan all ports and sneaky mode.
Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?
Production
Test
Staging
Development
An analyst receives multiple alerts for beaconing activity for a host on the network. After analyzing the activity, the analyst observes the following activity:
- A user enters comptia.org into a web browser.
- The website that appears is not the comptia.org site.
- The website is a malicious site from the attacker.
- Users in a different office are not having this issue.
Which of the following types of attacks was observed?
On-path attack
DNS poisoning
Locator (URL) redirection
Domain hijacking
Which of the following in the incident response process is the BEST approach to improve the speed of the identification phase?
Activate verbose logging in all critical assets.
Tune monitoring in order to reduce false positive rates.
Redirect all events to multiple syslog servers.
Increase the number of sensors present on the environment.
A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng, the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of the legitimate access points.
Which of the following attacks is happening on the corporate network?
On-path
Evil twin
Jamming
Rogue access point
Disassociation
When implementing automation with IoT devices, which of the following should be considered FIRST to keep the network secure?
Z-Wave compatibility
Network range
Zigbee configuration
Communication protocols
An organization is concerned that its hosted web servers are not running the most updated version of the software.
Which of the following would work BEST to help identify potential vulnerabilities?
Hping3 -S comptia-org -p 80
Nc -l -v comptia.org -p 80
Nmap comptia.org -p 80 -sV
Nslookup –port
A news article states hackers have been selling access to IoT camera feeds.
Which of the following is the MOST likely reason for this issue?
Outdated software
Weak credentials
Lack of encryption
Backdoors
A company wants to build a new website to sell products online. The website will host a storefront application that will allow visitors to add products to a shopping cart and pay for the products using a credit card.
Which of the following protocols would be the MOST secure to implement?
SSL
SFTP
SNMP
TLS
An IT manager is estimating the mobile device budget for the upcoming year. Over the last five years, the number of devices that were replaced due to loss, damage, or theft steadily increased by 10%.
Which of the following would BEST describe the estimated number of devices to be replaced next year?
ALE
ARO
RPO
SLE
An organization is repairing the damage after an incident.
Which of the following controls is being implemented?
Detective
Preventive
Corrective
Compensating
A Chief Executive Officer’s (CEO) personal information was stolen in a social-engineering attack.
Which of the following sources would reveal if the CEO’s personal information is for sale?
Automated information sharing
Open-source intelligence
The dark web
Vulnerability databases
Which of the following typically uses a combination of human and artificial intelligence to analyze event data and take action without intervention?
TTP
OSINT
SOAR
SIEM
A security analyst has been tasked with creating a new WiFi network for the company. The requirements received by the analyst are as follows:
- Must be able to differentiate between users connected to WiFi
- The encryption keys need to change routinely without interrupting the users or forcing reauthentication
- Must be able to integrate with RADIUS
- Must not have any open SSIDs
Which of the following options BEST accommodates these requirements?
WPA2-Enterprise
WPA3-PSK
802.11n
WPS
A security administrator is trying to determine whether a server is vulnerable to a range of attacks. After using a tool, the administrator obtains the following output:
HTTP/1.0 200 OK
Content-Type: text/html
Server: Apache
root:s9fyf983#:0:1:System Operator:/:/bin/bash
daemon:*:1:1::/tmp:
user1:fi@su3FF:183:100:user:/home/users/user1:/bin/bash
Which of the following attacks was successfully implemented based on the output?
Memory leak
Race conditions
SQL injection
Directory traversal
A Chief Security Officer is looking for a solution that can reduce the occurrence of customers receiving errors from back-end infrastructure when systems go offline unexpectedly. The security architect would like the solution to help maintain session persistence.
Which of the following would BEST meet the requirements?
Reverse proxy
NIC teaming
Load balancer
Forward proxy
{"name":"SY0-601 v3 - Active untill 4 NOV 21", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which of the following would be the BEST way to analyze diskless malware that has infected a VDI?, Users are presented with a banner upon each login to a workstation. The banner mentions that users are not entitled to any reasonable expectation of privacy and access is for authorized personnel only. In order to proceed past that banner, users must click the OK button. Which of the following is this an example of?, The Chief Information Security Officer is concerned about employees using personal email rather than company email to communicate with clients and sending sensitive business information and Pll. Which of the following would be the BEST solution to install on the employees’ workstations to prevent information from leaving the company's network?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
Quiz Off Christmas 2022 Edition
1050
KUIS MABIM KLOTER 2
392028
Am I gay
7431
Citizenship Test
221126
Discover Your Medieval Weapon: Free Personality
201025776
Think You Know Schitts Creek? Take the Ultimate Trivia!
201057425
Free Salesforce CRM Fundamentals
201021613
Free WHAP Unit 1 Practice Test
201021766
Which BFB Character Are You? Free Personality
201032308
Which Seinfeld Character Are You? Find Your Match Fast
201034048
Ultimate World Geography: Test Your Geo Knowledge!
201025542
Free Water Potential Practice Problems Answer Key
201025776