Big October Special Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

SY0-601 Sample Questions Answers

Questions 4

A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?

Options:

A.

Randomize the shared credentials

B.

Use only guest accounts to connect.

C.

Use SSH keys and remove generic passwords

D.

Remove all user accounts.

Buy Now
Questions 5

A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale?

Options:

A.

Automated information sharing

B.

Open-source intelligence

C.

The dark web

D.

Vulnerability databases

Buy Now
Questions 6

A security analyst is logged into a Windows file server and needs to see who is accessing files and from which computers Which of the following tools should the analyst use?

Options:

A.

netstat

B.

net share

C.

netcat

D.

nbtstat

E.

net session

Buy Now
Questions 7

A security analyst needs to complete an assessment. The analyst is logged into a server and must use native tools to map services running on it to the server's listening ports. Which of the following tools can BEST accomplish this talk?

Options:

A.

Netcat

B.

Netstat

C.

Nmap

D.

Nessus

Buy Now
Questions 8

A user recently attended an exposition and received some digital promotional materials The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open Which of the following is MOST likely the cause of the reported issue?

Options:

A.

There was a drive-by download of malware

B.

The user installed a cryptominer

C.

The OS was corrupted

D.

There was malicious code on the USB drive

Buy Now
Questions 9

A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS. Which of the following must be part of the security architecture to achieve AAA? (Select TWO)

Options:

A.

DNSSEC

B.

Reverse proxy

C.

VPN concentrator

D.

PKI

E.

Active Directory

F.

RADIUS

Buy Now
Questions 10

Local guidelines require that all information systems meet a minimum-security baseline to be compliant. Which of the following can security administrators use to assess their system configurations against the baseline?

Options:

A.

SOAR playbook

B.

Security control matrix

C.

Risk management framework

D.

Benchmarks

Buy Now
Questions 11

An analyst has determined that a server was not patched and an external actor exfiltrated data on port 139. Which of the following sources should the analyst review to BEST ascertain how the Incident could have been prevented?

Options:

A.

The vulnerability scan output

B.

The security logs

C.

The baseline report

D.

The correlation of events

Buy Now
Questions 12

An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?

Options:

A.

TLS

B.

PFS

C.

ESP

D.

AH

Buy Now
Questions 13

An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?

Options:

A.

Incremental backups Monday through Friday at 6:00 p.m and differential backups hourly

B.

Full backups Monday through Friday at 6:00 p.m and incremental backups hourly.

C.

incremental backups Monday through Friday at 6:00 p.m and full backups hourly.

D.

Full backups Monday through Friday at 6:00 p.m and differential backups hourly.

Buy Now
Questions 14

Employees are having issues accessing the company's website. Some employees report very slow performance, while others cannot the website at all. The web and security administrators search the logs and find millions of half-open connections to port 443 on the web server. Further analysis reveals thousands of different source IPs initiating this traffic. Which of the following attacks is MOST likely occurring?

Options:

A.

DDoS

B.

Man-in-the-middle

C.

MAC flooding

D.

Domain hijacking

Buy Now
Questions 15

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen. Which of the following would BEST meet these requirements? (Select TWO).

Options:

A.

Full-device encryption

B.

Network usage rules

C.

Geofencing

D.

Containerization

E.

Application whitelisting

F.

Remote control

Buy Now
Questions 16

Which of the following are requirements that must be configured for PCI DSS compliance? (Select TWO).

Options:

A.

Testing security systems and processes regularly

B.

Installing and maintaining a web proxy to protect cardholder data

C.

Assigning a unique ID to each person with computer access

D.

Encrypting transmission of cardholder data across private networks

E.

Benchmarking security awareness training for contractors

F.

Using vendor-supplied default passwords for system passwords

Questions 17

An engineer wants to access sensitive data from a corporate-owned mobile device. Personal data is not allowed on the device. Which of the following MDM configurations must be considered when the engineer travels for business?

Options:

A.

Screen locks

B.

Application management

C.

Geofencing

D.

Containerization

Buy Now
Questions 18

Which of the following algorithms has the SMALLEST key size?

Options:

A.

DES

B.

Twofish

C.

RSA

D.

AES

Buy Now
Questions 19

An attacker is trying to gain access by installing malware on a website that is known to be visited by the target victims. Which of the following is the attacker MOST likely attempting?

Options:

A.

A spear-phishing attack

B.

A watering-hole attack

C.

Typo squatting

D.

A phishing attack

Buy Now
Questions 20

To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?

Options:

A.

MaaS

B.

laaS

C.

SaaS

D.

PaaS

Buy Now
Questions 21

Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?

Options:

A.

Risk matrix

B.

Risk tolerance

C.

Risk register

D.

Risk appetite

Buy Now
Questions 22

A forensics examiner is attempting to dump password cached in the physical memory of a live system but keeps receiving an error message. Which of the following BEST describes the cause of the error?

Options:

A.

The examiner does not have administrative privileges to the system

B.

The system must be taken offline before a snapshot can be created

C.

Checksum mismatches are invalidating the disk image

D.

The swap file needs to be unlocked before it can be accessed

Buy Now
Questions 23

A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:

Which of the following BEST describes this kind of attack?

Options:

A.

Directory traversal

B.

SQL injection

C.

API

D.

Request forgery

Buy Now
Questions 24

An organization is building backup sever moms in geographically diverse locations. The Chief information Security Officer implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulnerabilities in the existing sewer room, Which of the following should the systems engineer consider’?

Options:

A.

Purchasing hardware from different vendors

B.

Migrating workloads to public cloud infrastructure

C.

Implementing a robust patch management solution

D.

Designing new detective security controls

Buy Now
Questions 25

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO).

Options:

A.

MAC filtering

B.

Zero Trust segmentation

C.

Network access control

D.

Access control vestibules

E.

Guards

F.

Bollards

Buy Now
Questions 26

After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

Options:

A.

A DMZ

B.

A VPN

C.

A VLAN

D.

An ACL

Buy Now
Questions 27

To further secure a company’s email system, an administrator is adding public keys to DNS records in the company’s domain Which of the following is being used?

Options:

A.

PFS

B.

SPF

C.

DMARC

D.

DNSSEC

Buy Now
Questions 28

An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?

Options:

A.

HSM

B.

CASB

C.

TPM

D.

DLP

Buy Now
Questions 29

An end user reports a computer has been acting slower than normal for a few weeks, During an investigation, an analyst determines the system 3 sending the users email address and a ten-digit number ta an IP address once a day. The only resent log entry regarding the user's computer is the following:

Which of the following is the MOST likely cause of the issue?

Options:

A.

The end user purchased and installed 2 PUP from a web browser.

B.

4 bot on the computer is rule forcing passwords against a website.

C.

A hacker Is attempting to exfilltrated sensitive data.

D.

Ransomwere is communicating with a command-and-control server.

Buy Now
Questions 30

A security analyst is reviewing a penetration-testing report from a third-party contractor. The penetration testers used the organization's new API to bypass a driver to perform privilege escalation on the organization's web servers. Upon looking at the API, the security analyst realizes the particular API call was to a legacy system running an outdated OS. Which of the following is the MOST likely attack type?

Options:

A.

Request forgery

B.

Session replay

C.

DLL injection

D.

Shimming

Buy Now
Questions 31

A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes. Which of the following roles should the developer configure to meet these requirements? (Select TWO).

Options:

A.

Identity processor

B.

Service requestor

C.

Identity provider

D.

Service provider

E.

Tokenized resource

F.

Notarized referral

Buy Now
Questions 32

An attacker was easily able to log in to a company's security camera by performing a baste online search for a setup guide for that particular camera brand and model. Which of the following BEST describes the configurations the attacker exploited?

Options:

A.

Weak encryption

B.

Unsecure protocols

C.

Default settings

D.

Open permissions

Buy Now
Questions 33

Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

Options:

A.

Unsecured root accounts

B.

Zero day

C.

Shared tenancy

D.

Insider threat

Buy Now
Questions 34

A grocery store is expressing security and reliability concerns regarding the on-site backup strategy currently being performed by locally attached disks. The main concerns are the physical security of the backup media and the durability of the data stored on these devices Which of the following is a cost-effective approach to address these concerns?

Options:

A.

Enhance resiliency by adding a hardware RAID.

B.

Move data to a tape library and store the tapes off site

C.

Install a local network-attached storage.

D.

Migrate to a cloud backup solution

Buy Now
Questions 35

Ann, a forensic analyst, needs to prove that the data she originally acquired has remained unchanged while in her custody. Which of the following should Ann use?

Options:

A.

Chain of custody

B.

Checksums

C.

Non-repudiation

D.

Legal hold

Buy Now
Questions 36

After installing a Windows server, a cybersecurity administrator needs to harden it, following security best practices. Which of the following will achieve the administrator's goal? (Select TWO).

Options:

A.

Disabling guest accounts

B.

Disabling service accounts

C.

Enabling network sharing

D.

Disabling NetBIOS over TCP/IP

E.

Storing LAN manager hash values

F.

Enabling NTLM

Buy Now
Questions 37

Which of the following holds staff accountable while escorting unauthorized personnel?

Options:

A.

Locks

B.

Badges

C.

Cameras

D.

Visitor logs

Buy Now
Questions 38

Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?

Options:

A.

MSSP

B.

Public cloud

C.

Hybrid cloud

D.

Fog computing

Buy Now
Questions 39

When planning to build a virtual environment, an administrator need to achieve the following,

•Establish polices in Limit who can create new VMs

•Allocate resources according to actual utilization‘

•Require justification for requests outside of the standard requirements.

•Create standardized categories based on size and resource requirements

Which of the following is the administrator MOST likely trying to do?

Options:

A.

Implement IaaS replication

B.

Product against VM escape

C.

Deploy a PaaS

D.

Avoid VM sprawl

Buy Now
Questions 40

Which of the following would cause a Chief Information Security Officer (CISO) the MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?

Options:

A.

An inability to monitor 100%, of every facility could expose the company to unnecessary risk.

B.

The cameras could be compromised if not patched in a timely manner.

C.

Physical security at the facility may not protect the cameras from theft.

D.

Exported videos may take up excessive space on the file servers.

Buy Now
Questions 41

A security analyst has received several reports of an issue on an internal web application. Users stale they are having to provide their credential twice lo log in. The analyst checks with the application team and notes this is not an expected behavior. After looking at several loos the analyst decades to run some commands on the gateway and obtains the following output

Internet address

Which of the following BEST describes the attack the company is experiencing?

Options:

A.

MAC flooding

B.

URL redirection

C.

ARP poisoning

D.

DNS hijacking

Buy Now
Questions 42

A security analyst is reviewing the following command-line output:

Which of the following Is the analyst observing?

Options:

A.

IGMP spoofing

B.

URL redirection

C.

MAC address cloning

D.

DNS poisoning

Buy Now
Questions 43

Which of the following types of attacks is specific to the individual it targets?

Options:

A.

Whaling

B.

Pharming

C.

Smishing

D.

Credential harvesting

Buy Now
Questions 44

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location Which of the following would BEST meet the architect's objectives?

Options:

A.

Trusted Platform Module

B.

laaS

C.

HSMaaS

D.

PaaS

E.

Key Management Service

Buy Now
Questions 45

In the middle of a cybersecurity, a security engineer removes the infected devices from the network and lock down all compromised accounts. In which of the following incident response phases is the security engineer currently operating?

Options:

A.

Identification

B.

Preparation

C.

Eradiction

D.

Recovery

E.

Containment

Buy Now
Questions 46

Which of the following ISO standards is certified for privacy?

Options:

A.

ISO 9001

B.

ISO 27002

C.

ISO 27701

D.

ISO 31000

Buy Now
Questions 47

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?

Options:

A.

Salting the magnetic strip information

B.

Encrypting the credit card information in transit.

C.

Hashing the credit card numbers upon entry.

D.

Tokenizing the credit cards in the database

Buy Now
Questions 48

A startup company is using multiple SaaS and IaaS platforms to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?

Options:

A.

SIEM

B.

DLP

C.

CASB

D.

SWG

Buy Now
Questions 49

A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?

Options:

A.

SDP

B.

AAA

C.

IaaS

D.

MSSP

E.

Microservices

Buy Now
Questions 50

A security administrator suspects there may be unnecessary services running on a server. Which of the following tools will the administrator MOST likely use to confirm the suspicions?

Options:

A.

Nmap

B.

Wireshark

C.

Autopsy

D.

DNSEnum

Buy Now
Questions 51

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?

Options:

A.

dd

B.

chmod

C.

dnsenum

D.

logger

Buy Now
Questions 52

Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?

Options:

A.

The document is a honeyfile and is meant to attract the attention of a cyberintruder.

B.

The document is a backup file if the system needs to be recovered.

C.

The document is a standard file that the OS needs to verify the login credentials.

D.

The document is a keylogger that stores all keystrokes should the account be compromised.

Buy Now
Questions 53

An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?

Options:

A.

The system was configured with weak default security settings.

B.

The device uses weak encryption ciphers.

C.

The vendor has not supplied a patch for the appliance.

D.

The appliance requires administrative credentials for the assessment.

Buy Now
Questions 54

A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?

Options:

A.

Security

B.

Application

C.

Dump

D.

Syslog

Buy Now
Questions 55

A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)

Options:

A.

Dual power supply

B.

Off-site backups

C.

Automatic OS upgrades

D.

NIC teaming

E.

Scheduled penetration testing

F.

Network-attached storage

Buy Now
Questions 56

During an incident response, a security analyst observes the following log entry on the web server.

Which of the following BEST describes the type of attack the analyst is experience?

Options:

A.

SQL injection

B.

Cross-site scripting

C.

Pass-the-hash

D.

Directory traversal

Buy Now
Questions 57

A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?

Options:

A.

Predictability

B.

Key stretching

C.

Salting

D.

Hashing

Buy Now
Questions 58

A company's Chief Information Office (CIO) is meeting with the Chief Information Security Officer (CISO) to plan some activities to enhance the skill levels of the company's developers. Which of the following would be MOST suitable for training the developers'?

Options:

A.

A capture-the-flag competition

B.

A phishing simulation

C.

Physical security training

D.

Baste awareness training

Buy Now
Questions 59

A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?

Options:

A.

The most common set of MDM configurations will become the effective set of enterprise mobile security controls.

B.

All devices will need to support SCEP-based enrollment; therefore, the heterogeneity of the chosen architecture may unnecessarily expose private keys to adversaries.

C.

Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors.

D.

MDMs typically will not support heterogeneous deployment environments, so multiple MDMs will need to be installed and configured.

Buy Now
Questions 60

A user enters a password to log in to a workstation and is then prompted to enter an authentication code. Which of the following MFA factors or attributes are being utilized in the authentication process? (Select TWO).

Options:

A.

Something you know

B.

Something you have

C.

Somewhere you are

D.

Someone you are

E.

Something you are

F.

Something you can do

Buy Now
Questions 61

Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?

Options:

A.

Least privilege

B.

Awareness training

C.

Separation of duties

D.

Mandatory vacation

Buy Now
Questions 62

A network administrator would like to configure a site-to-site VPN utilizing iPSec. The administrator wants the tunnel to be established with data integrity encryption, authentication and anti- replay functions Which of the following should the administrator use when configuring the VPN?

Options:

A.

AH

B.

EDR

C.

ESP

D.

DNSSEC

Buy Now
Questions 63

Which of the following technical controls is BEST suited for the detection and prevention of buffer overflows on hosts?

Options:

A.

DLP

B.

HIDS

C.

EDR

D.

NIPS

Buy Now
Questions 64

Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)

Options:

A.

COPE

B.

VDI

C.

GPS

D.

TOTP

E.

RFID

F.

BYOD

Buy Now
Questions 65

A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?

Options:

A.

Configure the perimeter firewall to deny inbound external connections to SMB ports.

B.

Ensure endpoint detection and response systems are alerting on suspicious SMB connections.

C.

Deny unauthenticated users access to shared network folders.

D.

Verify computers are set to install monthly operating system, updates automatically.

Buy Now
Questions 66

A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?

Options:

A.

PCI DSS

B.

ISO 22301

C.

ISO 27001

D.

NIST CSF

Buy Now
Questions 67

A security analyst is reviewing the following attack log output:

Which of the following types of attacks does this MOST likely represent?

Options:

A.

Rainbow table

B.

Brute-force

C.

Password-spraying

D.

Dictionary

Buy Now
Exam Code: SY0-601
Exam Name: CompTIA Security+ Exam 2021
Last Update: Oct 19, 2021
Questions: 453
$72  $159.99
$51.75  $114.99
$45  $99.99
buy now SY0-601