SY0-601 Practice Test Questions

886 Questions


Topic 3: Exam Pool C

Which of the following types of controls is a turnstile?


A.

Physical


B.

Detective


C.

Corrective


D.

Technical





A.
  

Physical



An organization is concerned that is hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?


A.

Hping3 –s comptia, org –p 80


B.

Nc -1 –v comptia, org –p 80


C.

nmp comptia, org –p 80 –aV


D.

nslookup –port=80 comtia.org





C.
  

nmp comptia, org –p 80 –aV



Explanation: Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.

An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes Which of the following is the 60- minute expectation an example of:


A.

MTBF


B.

RPO


C.

MTTR


D.

DRTO





D.
  

DRTO



A network engineer is troubleshooting wireless network connectivity issues that were
reported by users. The issues are occurring only in the section of the building that is closest
to the parking lot. Users are intermittently experiencing slow speeds when accessing
websites and are unable to connect to network drives. The issues appear to increase when
laptop users return desks after using their devices in other areas of the building. There
have also been reports of users being required to enter their credentials on web pages in
order to gain access to them. Which of the following is the MOST likely cause of this issue?


A.

An external access point is engaging in an evil-twin attack.


B.

The signal on the WAP needs to be increased in that section of the building.


C.

The certificates have expired on the devices and need to be reinstalled.


D.

The users in that section of the building are on a VLAN that is being blocked by the firewall.





A.
  

An external access point is engaging in an evil-twin attack.



A security manager for a retailer needs to reduce the scope of a project to comply with PCI
DSS. The PCI data is located in different offices than where credit cards are accepted. All
the offices are connected via MPLS back to the primary datacenter. Which of the following
should the security manager implement to achieve the objective?


A.

Segmentation


B.

Containment


C.

Geofencing


D.

Isolation





A.
  

Segmentation



A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are:
www.company.com (main website)
contactus.company.com (for locating a nearby location)
quotes.company.com (for requesting a price quote)
The company wants to purchase one SSL certificate that will work for all the existing
applications and any future applications that follow the same naming conventions, such as
store.company.com. Which of the following certificate types would BEST meet the
requirements?


A.

SAN


B.

Wildcard


C.

Extended validation


D.

Self-signed





B.
  

Wildcard



A security analyst needs to complete an assessment. The analyst is logged into a server
and must use native tools to map services running on it to the server's listening ports.
Which of the following tools can BEST accomplish this talk?


A.

Netcat


B.

Netstat


C.

Nmap


D.

Nessus





B.
  

Netstat



The following is an administrative control that would be MOST effective to reduce the
occurrence of malware execution?


A.

Security awareness training


B.

Frequency of NIDS updates


C.

Change control procedures


D.

EDR reporting cycle





A.
  

Security awareness training



A systems analyst is responsible for generating a new digital forensics chain-of-custody form Which of the following should the analyst Include in this documentation? (Select
TWO).


A.

The order of volatility


B.

A checksum


C.

The location of the artifacts


D.

The vendor's name


E.

The date and time


F.

A warning bnner





A.
  

The order of volatility



E.
  

The date and time



A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on thecompromised server. Which of the following files should be given to the forensics firm?


A.

Security


B.

Application


C.

Dump


D.

Syslog





A.
  

Security



A company's Chief Information Security Officer (CISO) recently warned the security
manager that the company’s Chief Executive Officer (CEO) is planning to publish a
controversial option article in a national newspaper, which may result in new cyberattacks
Which of the following would be BEST for the security manager to use in a threat mode?


A.

Hacktivists


B.

White-hat hackers


C.

Script kiddies


D.

Insider threats





A.
  

Hacktivists



An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?


A.

Order of volatility


B.

Data recovery


C.

Chain of custody


D.

Non-repudiation





C.
  

Chain of custody




Page 7 out of 74 Pages
Previous