CompTIA SY0-601 - CompTIA Security+ Exam 2023
While preparing a software inventory report, a security analyst discovers an unauthorized program installed on most of the company's servers. The program utilizes the same code signing certificate as an application deployed to only the accounting team. After removing the unauthorized program, which of the following mitigations should the analyst implement to BEST secure the server environment?
The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?
Which of the following would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations?
Which of the following is performed to gain a better understanding of how specific devices are set up by identifying the arrangement of settings?
A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately protected from advanced threats and malware. The CSO believes there is a high risk that a data breach could occur in the near future due to the lack of detective and preventive controls Which of the following should be implemented to best address the CSO's concerns? (Select two).
A network manager wants to protect the company's VPN by multifactor authentication that uses:
• Something you know
• Something you have
• Somewhere you are
Which of the following would accomplish the manager's goal?
Which of the following would be best suited for constantly changing environments?
A systems administrator set up an automated process that checks for vulnerabilities across the entire environment every morning. Which of the following activities is the systems administrator conducting?
Which of the following test describes the risk that is present once mitigations are applied?
Which of the following scenarios describes a possible business email compromise attack?
A user's login credentials were recently compromised During the investigation, the security analyst determined the user input credentials into a pop-up window when prompted to confirm the username and password However the trusted website does not use a pop-up for entering user colonials Which of the following attacks occurred?
Which of the following has the ability to physically verify individuals who enter and exit a restricted area?
Which of the following is used to validate a certificate when it is presented to a user?
An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker most likely attempting?
Which of the following strategies shifts risks that are not covered in an organization's risk strategy?
Which of the following is used to quantitatively measure the criticality of a vulnerability?
A company wants to ensure that all employees in a given department are trained on each job role to help with employee burnout and continuity of business operations in the event an employee leaves the company. Which of the following should the company implement?
An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?
A network administrator added a new router to the network. Which of the following should the administrator do first when configuring the router?
A company is designing the layout of a new data center so it will have an optimal environmental temperature Which of the following must be included? (Select two).