140 likes | 148 Views
<br>If you want to improve your result with little effort then you should you expertly designed SY0-601 Study Material. Our experts have worked hard for this helping material for the best performance of the students. Students work has become very easy now they can prepare from to-the-point questions and answers that will be covering all the syllabus contents. They donu2019t need to collect course related data from different places now because they are having all the required information to ace their exam at one place at DumpsFactory.
E N D
CompTIA SY0 -601 Exam CompTIA Security+ Exam Questions & Answers Demo https://www.dumpsfactory.com/comptia/sy0-601-dumps.html
Questions&AnswersPDF Page2 Version:9.1 Question:1 SIMULATION AcompanyrecentlyaddedaDRsiteandisredesigningthenetwork. issuesbrowsingwebsites. INSTRUCTIONS Clickoneachfirewalltodothefollowing: Denycleartextwebtraffic. Ensuresecuremanagementprotocolsareused. ResolveissuesattheDRsite. Therulesetordercannotbemodifiedduetooutsideconstraints. Ifatanytimeyouwouldliketobringbacktheinitial button. UsersattheDRsitearehaving stateofthesimulation,pleaseclicktheResetAll
Questions&AnswersPDF Page3
Questions&AnswersPDF Page4
Questions&AnswersPDF Page5 Answer:A A.Explanation: Firewall1:
Questions&AnswersPDF Page6 DNSRule–ANY-->ANY-->DNS-->PERMIT HTTPSOutbound–10.0.0.1/24-->ANY-->HTTPS-->PERMIT Management–ANY-->ANY-->SSH-->PERMIT HTTPSInbound–ANY-->ANY-->HTTPS-->PERMIT HTTPInbound–ANY-->ANY-->HTTP-->DENY Firewall2:
Questions&AnswersPDF Page7 Firewall3:
Questions&AnswersPDF Page8 DNSRule–ANY-->ANY-->DNS-->PERMIT HTTPSOutbound–192.168.0.1/24-->ANY-->HTTPS-->PERMIT Management–ANY-->ANY-->SSH-->PERMIT HTTPSInbound–ANY-->ANY-->HTTPS-->PERMIT HTTPInbound–ANY-->ANY-->HTTP-->DENY Question:2 DRAGDROP Asecurityengineerissettinguppasswordlessauthenticationforthefirsttime. INSTRUCTIONS Usetheminimumsetofcommandstosetthisupandverifythatitworks.Commandscannotbereused. Ifatanytimeyouwouldliketobringbacktheinitial button. stateofthesimulation,pleaseclicktheResetAll Answer:
Questions&AnswersPDF Page9 Question:3 HOTSPOT Selecttheappropriateattackandremediationfromeachdrop-downlisttolabel attackwithitsremediation. INSTRUCTIONS Notallattacksandremediationactionswillbeused. Ifatanytimeyouwouldliketobringbacktheinitial button. thecorresponding stateofthesimulation,pleaseclicktheResetAll
Questions&AnswersPDF Page10 Answer:
Questions&AnswersPDF Page11 Question:4 Whichof programmable-logic controllers, running aback-endLAMPserver managementinterfacesthatareaccessibleovertheInternetviaawebinterface?(Choosetwo.) thefollowingwill MOSTlikelyadverselyimpact theoperationsof unpatchedtraditional andOTsystems withhuman- A.Cross-sitescripting B.Dataexfiltration C.Poorsystemlogging D.Weakencryption E.SQLinjection F.Server-siderequestforgery Answer:DF Question:5 AcompanyrecentlytransitionedtoastrictlyBYODcultureduetothecostofreplacinglostordamaged corporate-ownedmobiledevices. WhichofthefollowingtechnologieswouldbeBESTtobalancethe BYODculturewhilealsoprotectingthecompany’sdata? A.Containerization B.Geofencing C.Full-diskencryption D.Remotewipe Answer:C Question:6 AChief practicestominimizesystemdowntimeandenhanceorganizational SecurityOffice's(CSO's) keyprioritiesaretoimprovepreparation, response, andrecovery resiliencetoransomwareattacks.
Questions&AnswersPDF Page12 WhichofthefollowingwouldBESTmeettheCSO'sobjectives? A. Useemail-filteringsoftwareandcentralizedaccount restrictadministrationprivilegesonfileshares. B.Purchasecyberinsurancefromareputableprovidertoreduceexpensesduringanincident. C. Investinend-userawarenesstrainingtochangethelong-termcultureandbehaviorof executives,reducingtheorganization'ssusceptibilitytophishingattacks. D. Implement applicationwhitelistingandcentralizedevent-logmanagement, testingandvalidationoffullbackups. management, patchhigh-risksystems, and staffand andperformregular Answer:D Question:7 Anetworkengineerhasbeenaskedtoinvestigatewhyseveral computersinawarehousehaveintermittentconnectivitytotheshippingserver.Thebarcodescanners andcomputersareallonforklifttrucksandmovearoundthewarehouseduringtheirregularuse.Which ofthefollowingshouldtheengineerdotodeterminetheissue?(Choosetwo.) wirelessbarcodescannersandwireless A.Performasitesurvey B.DeployanFTKImager C.Createaheatmap D.Scanforrogueaccesspoints E.Upgradethesecurityprotocols F.Installacaptiveportal Answer:AC Question:8 Asecurity competitor.Companypolicyrequirestheadministratortocaptureanexactcopyoftheemployee’shard disk.Whichofthefollowingshouldtheadministratoruse? administrator suspects anemployeehas beenemailingproprietary informationtoa A.dd B.chmod C.dnsenum D.logger Answer:A Question:9 WhichofthefollowingisMOSTlikelytooutlinetherolesandresponsibilitiesofdatacontrollersanddata processors?
Questions&AnswersPDF Page13 A.SSAESOC2 B.PCIDSS C.GDPR D.ISO31000 Answer:C Question:10 Phishingandspear-phishingattackshavebeenoccurringmorefrequentlyagainstacompany’sstaff. WhichofthefollowingwouldMOSTlikelyhelpmitigatethisissue? A.DNSSECandDMARC B.DNSquerylogging C.ExactmailexchangerrecordsintheDNS D.TheadditionofDNSconditionalforwarders Answer:C Question:11 OnwhichofthefollowingistheliveacquisitionofdataforforensicanalysisMOSTdependent?(Choose two.) A.Dataaccessibility B.Legalhold C.Cryptographicorhashalgorithm D.Dataretentionlegislation E.Valueandvolatilityofdata F.Right-to-auditclauses Answer:EF Question:12 Whichof maintainingbusinessoperations? thefollowingincident responsesteps involves actions toprotect critical systems while A.Investigation B.Containment C.Recovery D.Lessonslearned Answer:B
Questions&AnswersPDF Page14 Question:13 Asecurityauditorisreviewingvulnerabilityscandataprovidedbyaninternal thefollowingBESTindicatesthatvalidcredentialswereused? securityteam.Whichof A.Thescanresultsshowopenports,protocols,andservicesexposedonthetargethost B.Thescanenumeratedsoftwareversionsofinstalledprograms C.Thescanproducedalistofvulnerabilitiesonthetargethost D.ThescanidentifiedexpiredSSLcertificates Answer:B Question:14 WhichofthefollowingBESTexplainsthedifferencebetweenadataownerandadatacustodian? A.Thedataownerisresponsibleforadheringtotherulesforusingthedata,whilethedatacustodianis responsiblefordeterminingthecorporategovernanceregardingthedata B.Thedataownerisresponsiblefordetermininghowthedatamaybeused,whilethedatacustodianis responsibleforimplementingtheprotectiontothedata C. Thedataownerisresponsibleforcontrollingthedata, maintainingthechainofcustodywhenhandlingthedata D.Thedataownergrantsthetechnicalpermissionsfordataaccess,whilethedatacustodianmaintains thedatabaseaccesscontrolstothedata whilethedatacustodianisresponsiblefor Answer:B Question:15 Anetworkengineerneedstobuildasolutionthatwill accesstheInternetviaWiFi.Thissolutionshouldnotallowaccesstotheinternalcorporatenetwork,but itshouldrequiregueststosignoffontheacceptableusepolicybeforeaccessingtheInternet.Whichof thefollowingshouldtheengineeremploytomeettheserequirements? allowguestsatthecompany’sheadquartersto A.ImplementopenPSKontheAPs B.DeployaWAF C.ConfigureWIPSontheAPs D.Installacaptiveportal Answer:D https://www.dumpsfactory.com/comptia/sy0-601-dumps.html