Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA SY0-601 - CompTIA Security+ Exam 2023

Page: 12 / 16
Total 1063 questions

Which of the following can be used to identify potential attacker activities without affecting production servers?

A.

Honeypot

B.

Video surveillance

C.

Zero Trust

D.

Geofencing

Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resumes?

A.

SLA

B.

MOU

C.

MOA

D.

BPA

Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider?

A.

Software as a service

B.

Infrastructure as code

C.

Internet of Things

D.

Software-defined networking

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done first?

A.

Configure heat maps.

B.

Utilize captive portals.

C.

Conduct a site survey.

D.

Install Wi-Fi analyzers.

Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

A.

Air gap

B.

Barricade

C.

Port security

D.

Screened subnet

A company is required to perform a risk assessment on an annual basis. Which of the following types of risk assessments does this requirement describe?

A.

Continuous

B.

Ad hoc

C.

Recurring

D.

One time

Which of the following would most likely mitigate the impact of an extended power outage on a company’s environment?

A.

Hot site

B.

UPS

C.

Snapshots

D.

SOAR

An employee in the accounting department receives an email containing a demand for payment for services performed by a vendor. However, the vendor is not in the vendor management database. Which of the following is this scenario an example of?

A.

Pretexting

B.

Impersonation

C.

Ransomware

D.

Invoice scam

After a web server was migrated to a cloud environment, user access to that server was Wocked Ever though an on-premises firewall configuration has been modified to reflect the cloud infrastructure, users are still experiencing access issues. Which of the following most likely needs to be configured?

A.

Security group

B.

Load balancer pool

C.

Resource allocation

D.

Storage permissions

Which of the following is most likely to include a SCADA system?

A.

Water treatment plant

B.

Surveillance system

C.

Smart watch

D.

Wi-Fi-enabled thermostat

Which of the following is the first step to take when creating an anomaly detection process?

A.

Selecting events

B.

Building a baseline

C.

Selecting logging options

D.

Creating an event log

An organization received threat intelligence describing an increase in credential harvesting across the industry A security analyst is reviewing the following authentication logs to look for potential Indicators of compromise.

Which of the following configurations can help prevent this hype of attack from occurring?

A.

Blocking malicious IPs

B.

Enabling impossible logins

C.

Deploying privileged access management

D.

Setting the max account lockout threshold

A company wants to move one of its environments to the cloud. The biggest requirement is to have as much control as possible regarding the environment. Which of the following would most likely satisfy this requirement?

A.

SaaS

B.

laaS

C.

PaaS

D.

MaaS

The cybersecurity investigation team is requesting a budget increase m order to purchase and implement a commercial tool for collecting information. The information might include disk images and volatile memory from computers used by remote employees Which of the following digital forensic categories does the company want to implement?

A.

Integrity

B.

E-discovery

C.

Acquisition

D.

Non-repudiation

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

A.

Fines

B.

Audit findings

C.

Sanctions

D.

Reputation damage

When a newly developed application was tested a specific internal resource was unable to be accessed Which of the following should be done to ensure the application works correctly?

A.

Modify the allow/deny list for those specific resources

B.

Follow the secure coding practices for the internal resource

C.

Configure the application in a sandbox environment

D.

Utilize standard network protocols

Which of the following best describes the tolerances a security architect follows when designing a control environment?

A.

Control risk

B.

Risk register

C.

Risk appetite

D.

Inherent risk

A company would like to implement a secure process for managing headless servers remotely Which of the following should the company most likely implement?

A.

SSH

B.

HTTPS

C.

FTPS

D.

LDAPS

An organization wants to reduce the likelihood that a data breach could result in reputational. financial, or regulatory consequences. The organization needs an enterprise-wide solution that does not require new technology or specialized roles Which of the following describes the best way to achieve these goals?

A.

Developing a process where sensitive data is converted to non-sensitive values such as a token

B.

Masking identifiable information so the data cannot be traced back to a specific user

C.

Incorporating the principle of data minimization throughout business processes

D.

Requiring users and customers to consent to the processing of their information

An organization developed a virtual thin client running in kiosk mode mat is used to access various software depending on the users' roles During a security evaluation, the test team identified the ability to exit kiosk mode and access system-level resources which led to privilege escalation Which of the following mitigations addresses this finding?

A.

Using application approved/dented lists

B.

Incorporating web content filtering

C.

Enforcing additional firewall rules

D.

Implementing additional network segmentation