SY0-601 Practice Test Questions

886 Questions


Topic 3: Exam Pool C

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?


A.

Mobile device management


B.

Full-device encryption


C.

Remote wipe


D.

Biometrics





A.
  

Mobile device management



A network engineer needs to create a plan for upgrading the wireless infrastructure in a
large office Priority must be given to areas that are currently experiencing latency and
connection issues. Which of the following would be the BEST resource for determining the
order of priority?


A.

Nmapn


B.

Heat maps


C.

Network diagrams


D.

Wireshark





C.
  

Network diagrams



A privileged user at a company stole several proprietary documents from a server. The
user also went into the log files and deleted all records of the incident. The systems
administrator has Just informed investigators that other log files are available for review.
Which of the following did the administrator MOST likely configure that will assist the
investigators?


A.

Memory dumps


B.

The syslog server


C.

The application logs


D.

The log retention policy





B.
  

The syslog server



A security analyst discovers several .jpg photos from a cellular phone during a forensics
investigation involving a compromised system. The analyst runs a forensics tool to gather
file metadata. Which of the following would be part of the images if all the metadata is still
intact?


A.

The GPS location


B.

When the file was deleted


C.

The total number of print jobs


D.

The number of copies made





A.
  

The GPS location



A security analyst is reviewing logs on a server and observes the following output:

Which of the following is the security analyst observing?


A.

A rainbow table attack


B.

A password-spraying attack


C.

A dictionary attack


D.

A keylogger attack





C.
  

A dictionary attack



A company’s bank has reported that multiple corporate credit cards have been stolen over the past several weeks. The bank has provided the names of the affected cardholders to the company’s forensics team to assist in the cyber-incident investigation. An incident responder learns the following information:
The timeline of stolen card numbers corresponds closely with affected users
making Internet-based purchases from diverse websites via enterprise desktop
PCs.
All purchase connections were encrypted, and the company uses an SSL
inspection proxy for the inspection of encrypted traffic of the hardwired network.
Purchases made with corporate cards over the corporate guest WiFi network,
where no SSL inspection occurs, were unaffected.
Which of the following is the MOST likely root cause?


A.

HTTPS sessions are being downgraded to insecure cipher suites


B.

The SSL inspection proxy is feeding events to a compromised SIEM


C.

The payment providers are insecurely processing credit card charges


D.

The adversary has not yet established a presence on the guest WiFi network





C.
  

The payment providers are insecurely processing credit card charges



The facilities supervisor for a government agency is concerned about unauthorized access to environmental systems in the event the staff WiFi network is breached. Which of the blowing would BEST address this security concern?


A.

install a smart meter on the staff WiFi.


B.

Place the environmental systems in the same DHCP scope as the staff WiFi.


C.

Implement Zigbee on the staff WiFi access points.


D.

Segment the staff WiFi network from the environmental systems network.





B.
  

Place the environmental systems in the same DHCP scope as the staff WiFi.



A user reports constant lag and performance issues with the wireless network whenworking at a local coffee shop. A security analyst walks the user through an installation ofWireshark and get a five-minute pcap to analyze. The analyst observes the following output:

Which of the following attacks does the analyst MOST likely see in this packet capture?


A.

Session replay


B.

Evil twin


C.

Bluejacking


D.

ARP poisoning





B.
  

Evil twin



A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack? (Choose


A.

DoS


B.

SSL stripping


C.

Memory leak


D.

Race condition


E.

Shimming


F.

Refactoring





A.
  

DoS



D.
  

Race condition



A security analyst is reviewing the following attack log output

Which of the following types of attacks does this MOST likely represent?


A.

Rainbow table


B.

Brute-force


C.

Password-spraying


D.

Dictionary





C.
  

Password-spraying



A security analyst discovers that a company username and password database was posted on an internet forum. The username and passwords are stored in plan text. Which of the following would mitigate the damage done by this type of data exfiltration in the future?


A.

Create DLP controls that prevent documents from leaving the network


B.

Imment salting and hashing


C.

Configure the web content filter to block access to the forum.


D.

Increase password complexity requirements





A.
  

Create DLP controls that prevent documents from leaving the network



A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?


A.

CVE


B.

SIEM


C.

SOAR


D.

CVSS





D.
  

CVSS




Page 9 out of 74 Pages
Previous