Vcehome > CompTIA > CompTIA Security+ > SY0-601 > SY0-601 Online Practice Questions and Answers

SY0-601 Online Practice Questions and Answers

Questions 4

Adynamic application vulnerability scan identified that code injection could be performed using a web form. Which of the following will be the BEST remediation to prevent this vulnerability?

A. Implement input validations.

B. Deploy MFA.

C. Utilize a WAF.

D. Configure HIPS.

Browse 1334 Q&As
Questions 5

DDoS attacks are causing an overload on the cluster of cloud servers. A security architect is researching alternatives to make the cloud environment respond to load fluctuation in a cost-effective way.

Which of the following options BEST fulfils the architect's requirements?

A. An orchestration solution that can adjust scalability of cloud assets

B. Use of multipath by adding more connections to cloud storage

C. Cloud assets replicated on geographically distributed regions

D. An on-site backup that is deployed and only used when the load increases

Browse 1334 Q&As
Questions 6

A security analyst is working on a project to implement a solution that monitors network communications and provides alerts when abnormal behavior is detected

Which of the following is the security analyst MOST likely implementing?

A. Vulnerability scans

B. User behavior analysis

C. Security orchestration, automation, and response

D. Threat hunting

Browse 1334 Q&As
Questions 7

After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?

A. The public ledger

B. The NetFlow data

C. A checksum

D. The event log

Browse 1334 Q&As
Questions 8

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the MOST acceptable?

A. SED

B. HSM

C. DLP

D. TPM

Browse 1334 Q&As
Questions 9

A security analyst needs to perform periodic vulnerability scans on production systems. Which of the following scan Types would produce the BEST vulnerability scan report?

A. Port

B. Intrusive

C. Host discovery

D. Credentialed

Browse 1334 Q&As
Questions 10

A news article states that a popular web browser deployed on all corporate PCs is vulnerable to a zero-day attack.

Which of the following MOST concerns the Chief Information Security Officer about the information in the news article?

A. Insider threats have compromised this network.

B. Web browsing is not functional for the entire network.

C. Antivirus signatures are required to be updated immediately.

D. No patches are available for the web browser.

Browse 1334 Q&As
Questions 11

Which of the following BEST explains the difference between a data owner and a data custodian?

A. The data owner is responsible for adhering to the rules for using the data, while the data custodian is responsible for determining the corporate governance regarding the data

B. The data owner is responsible for determining how the data may be used, while the data custodian is responsible for implementing the protection to the data

C. The data owner is responsible for controlling the data, while the data custodian is responsible for maintaining the chain of custody when handling the data

D. The data owner grants the technical permissions for data access, while the data custodian maintains the database access controls to the data

Browse 1334 Q&As
Questions 12

A security monitoring company offers a service that alerts its customers if their credit cards have been stolen. Which of the following is the MOST likely source of this information?

A. STIX

B. The dark web

C. TAXI

D. Social media

E. PCI

Browse 1334 Q&As
Questions 13

An organization is having difficulty correlating events from its individual AV, EDR. DLP. SWG, WAF, MDM. HIPS. and CASB systems. Which of the following Is the BEST way to improve the situation?

A. Remove expensive systems that generate few alerts,

B. Modify the systems to alert only on critical issues.

C. Utilize a SIEM to centralize logs and dashboards.

D. Implement a new syslog/NetFlow appliance.

Browse 1334 Q&As
Exam Code: SY0-601
Exam Name: CompTIA Security+
Last Update: May 03, 2024
Questions: 1334 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99