Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA SY0-601 - CompTIA Security+ Exam 2023

Page: 9 / 16
Total 1063 questions

While preparing a software inventory report, a security analyst discovers an unauthorized program installed on most of the company's servers. The program utilizes the same code signing certificate as an application deployed to only the accounting team. After removing the unauthorized program, which of the following mitigations should the analyst implement to BEST secure the server environment?

A.

Revoke the code signing certificate used by both programs.

B.

Block all unapproved file hashes from installation.

C.

Add the accounting application file hash to the allowed list.

D.

Update the code signing certificate for the approved application.

The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?

A.

Vulnerability scan

B.

Packet capture

C.

Threat feed

D.

User behavior

Which of the following would be most effective to contain a rapidly spreading attack that is affecting a large number of organizations?

A.

Machine learning

B.

DNS sinkhole

C.

Blocklist

D.

Honey pot

Which of the following is performed to gain a better understanding of how specific devices are set up by identifying the arrangement of settings?

A.

Log analysis

B.

Credentialed scan

C.

Configuration review

D.

Web application scan

E.

Network scan

A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately protected from advanced threats and malware. The CSO believes there is a high risk that a data breach could occur in the near future due to the lack of detective and preventive controls Which of the following should be implemented to best address the CSO's concerns? (Select two).

A.

AWAF

B.

A CASB

C.

An NG-SWG

D.

Segmentation

E.

Encryption

F.

Containenzation

A network manager wants to protect the company's VPN by multifactor authentication that uses:

• Something you know

• Something you have

• Somewhere you are

Which of the following would accomplish the manager's goal?

A.

Domain name, PKI, GeoIP lookup

B.

VPN IP address, company ID, partner site

C.

Password, authentication token, thumbprint

D.

Company URL, TLS certificate, home address

Which of the following would be best suited for constantly changing environments?

A.

RTOS

B.

Containers

C.

Embedded systems

D.

SCADA

A systems administrator set up an automated process that checks for vulnerabilities across the entire environment every morning. Which of the following activities is the systems administrator conducting?

A.

Scanning

B.

Alerting

C.

Reporting

D.

Archiving

Which of the following test describes the risk that is present once mitigations are applied?

A.

Control risk

B.

Residual risk

C.

Inherent risk

D.

Risk awareness

Which of the following scenarios describes a possible business email compromise attack?

A.

An employee receives a gift card request m an email that has an executive's name m the display held to the email

B.

Employees who open an email attachment receive messages demanding payment m order to access files

C.

A service desk employee receives an email from the HR director asking for log-in credentials lo a cloud administrator account

D.

An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.

A user's login credentials were recently compromised During the investigation, the security analyst determined the user input credentials into a pop-up window when prompted to confirm the username and password However the trusted website does not use a pop-up for entering user colonials Which of the following attacks occurred?

A.

Cross-site scripting

B.

SOL injection

C.

DNS poisoning

D.

Certificate forgery

Which of the following has the ability to physically verify individuals who enter and exit a restricted area?

A.

Barricade

B.

Access control vestibule

C.

Access log

D.

Gait analysis

Which of the following is used to validate a certificate when it is presented to a user?

A.

OCSP

B.

CSR

C.

CA

D.

CRC

An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker most likely attempting?

A.

A spear-phishing attach

B.

A watering-hole attack

C.

Typo squatting

D.

A phishing attack

Which of the following strategies shifts risks that are not covered in an organization's risk strategy?

A.

Risk transference

B.

Risk avoidance

C.

Risk mitigation

D.

Risk acceptance

Which of the following is used to quantitatively measure the criticality of a vulnerability?

A.

CVE

B.

CVSS

C.

CIA

D.

CERT

A company wants to ensure that all employees in a given department are trained on each job role to help with employee burnout and continuity of business operations in the event an employee leaves the company. Which of the following should the company implement?

A.

Separation of duties

B.

Job rotation

C.

Mandatory vacations

D.

Least privilege

An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?

A.

Document the collection and require a sign-off when possession changes.

B.

Lock the device in a safe or other secure location to prevent theft or alteration.

C.

Place the device in a Faraday cage to prevent corruption of the data.

D.

Record the collection in a block chain-protected public ledger.

A network administrator added a new router to the network. Which of the following should the administrator do first when configuring the router?

A.

Isolate the router.

B.

Apply patches.

C.

Remove unnecessary software.

D.

Change the default passwords.

A company is designing the layout of a new data center so it will have an optimal environmental temperature Which of the following must be included? (Select two).

A.

An air gap

B.

A cold aisle

C.

Removable doors

D.

A hot aisle

E.

An loT thermostat

F.

A humidity monitor