CompTIA SY0-601 Exam: Hash Drive Repartitioning Issue
29 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What issue is the company facing with the badge readers for building access?

  • Identity fraud
  • Phishing
  • Shoulder surfing
  • Tailgating (correct)
  • Why is the DLP appliance considered a weak design element in the organization's network setup?

  • Adding two hops in the VPN tunnel may slow down remote connections.
  • Split-tunnel connections can negatively impact the DLP appliance's performance.
  • The DLP appliance should be integrated into a NGFW.
  • Encrypted VPN traffic will not be inspected when entering or leaving the network. (correct)
  • What type of attack involves someone following an authorized person to gain entry into secure areas?

  • Identity fraud
  • Shoulder surfing
  • Phishing
  • Tailgating (correct)
  • What is the potential problem with split-tunnel connections in the organization's network setup?

    <p>Split-tunnel connections can negatively impact the DLP appliance's performance.</p> Signup and view all the answers

    What action might slow down remote connections in the organization's network?

    <p>Adding two hops in the VPN tunnel may slow down remote connections.</p> Signup and view all the answers

    What threat vector could be exploited if encrypted VPN traffic is not inspected?

    <p>'Data exfiltration' risks</p> Signup and view all the answers

    What cloud model would best suit an organization that wants to move only its email solution to the cloud?

    <p>SaaS</p> Signup and view all the answers

    Which type of attack occurred when a user input credentials into a pop-up window on a trusted website?

    <p>Cross-site scripting</p> Signup and view all the answers

    What tool with multiple components would be most suitable for tracking, analyzing, and monitoring devices without relying solely on definitions?

    <p>EDR</p> Signup and view all the answers

    Which cloud model would be suitable if an organization wants to maintain control over the software it develops and deploys in the cloud?

    <p>IaaS</p> Signup and view all the answers

    Which attack involves falsely creating digital certificates?

    <p>Certificate forgery</p> Signup and view all the answers

    What would be the appropriate solution for an organization wanting to prevent unauthorized access to its network based on behavior monitoring?

    <p>NGFW</p> Signup and view all the answers

    What action is the Chief Privacy Officer (CPO) adamant about in the context of PII in the development environment?

    <p>Data purge</p> Signup and view all the answers

    Why are the developers hesitant to remove real data from the development environment?

    <p>To perform functionality tests</p> Signup and view all the answers

    In the context of investigating a malware incident, what is the malware accessing?

    <p>A command-and-control website</p> Signup and view all the answers

    Where is the outbound Internet traffic logged in the scenario?

    <p>/logFiles/messages</p> Signup and view all the answers

    What would be the best command for the security analyst to use on the syslog server to search for recent traffic to the command-and-control website?

    <p>tail -500 /logFiles/messages | grep <a href="http://www.comptia.com">www.comptia.com</a></p> Signup and view all the answers

    What is the primary concern of the security analyst when investigating the malware incident?

    <p>Identifying and mitigating threats</p> Signup and view all the answers

    How did the attacker gain administrative access to the network in the scenario described?

    <p>A RAT</p> Signup and view all the answers

    What method did the attacker most likely use to maintain control of the compromised computer systems?

    <p>A rootkit</p> Signup and view all the answers

    What type of policy change was implemented in the company's recent BYOD policy?

    <p>Two-factor authentication mandate</p> Signup and view all the answers

    Which authentication method is NOT compliant with the new BYOD policy requirement?

    <p>Six-digit PIN</p> Signup and view all the answers

    What type of attack was initiated through the social media site in the scenario?

    <p>Drive-by download attack</p> Signup and view all the answers

    What was one of the outcomes of the security breach within the financial services firm?

    <p>Data exfiltration</p> Signup and view all the answers

    What is the most effective way to limit access to sensitive documents in a SaaS application by individuals in high-risk countries?

    <p>Geolocation policy</p> Signup and view all the answers

    Based on a security analyst reviewing logs, which attack is most likely occurring?

    <p>Password spraying</p> Signup and view all the answers

    What method can a company use to prevent unauthorized access to web APIs abused by unknown parties?

    <p>Rate limiting policies</p> Signup and view all the answers

    In the context of data security, what does the term 'data masking' refer to?

    <p>Hiding data by showing fictitious data instead of real values</p> Signup and view all the answers

    A company wants to ensure compliance with data protection regulations across different regions. What approach should they consider?

    <p>Enforcing data sovereignty regulations</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser