SY0-601 CompTIA Security+ Exam Questions & Answers
17 Questions
7 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

If a user received an SMS asking for bank details on their mobile phone, which social-engineering technique was used?

  • Spear phishing
  • Smishing (correct)
  • SPIM
  • Vishing
  • In the context of company engineers participating in a public Internet forum, what tactic would an attacker MOST likely use?

  • Pharming
  • Credential harvesting
  • Watering-hole attack (correct)
  • Hybrid warfare
  • In a flood zone, an organization is MOST likely to document concerns associated with the restoration of IT operation in a:

  • Disaster recovery plan (correct)
  • Business continuity plan
  • Continuity of operations plan
  • Communications plan
  • What solution would meet the requirements of implementing more stringent controls over administrator/root credentials and service accounts, including check-in/checkout of credentials, automated password changes, and logging of access to credentials?

    <p>A privileged access management system</p> Signup and view all the answers

    A security assessment determines DES and 3DES are still being used on recently deployed production servers. What did the assessment identify?

    <p>Weak encryption</p> Signup and view all the answers

    In a scenario where a security analyst notices an abundance of errors in the datacenter access logs for a fingerprint scanner, correlating with users' reports of issues accessing the facility, what is the MOST likely cause of the access issues?

    <p>Cross-over error rate</p> Signup and view all the answers

    During a global pandemic, which plan would be BEST to help an organization’s executives determine the next course of action when closing some business units and reducing staffing at others?

    <p>A business continuity plan</p> Signup and view all the answers

    In a scenario where a user reported being prompted for a name and password after connecting to the corporate wireless SSID, followed by unauthorized transactions from the bank, what attack vector was MOST likely used?

    <p>Rogue access point</p> Signup and view all the answers

    In the context of company engineers participating in a public Internet forum, what tactic would an attacker MOST likely use?

    <p>Watering-hole attack</p> Signup and view all the answers

    If a user received an SMS asking for bank details on their mobile phone, which social-engineering technique was used?

    <p>Smishing</p> Signup and view all the answers

    What is the MOST likely social-engineering technique used when an attacker sends an SMS asking for bank details on a user's mobile phone?

    <p>Smishing</p> Signup and view all the answers

    Which solution would meet the requirements of implementing more stringent controls over administrator/root credentials and service accounts, including check-in/checkout of credentials, automated password changes, and logging of access to credentials?

    <p>A privileged access management system</p> Signup and view all the answers

    Which tactic would an attacker MOST likely use in a scenario involving regular SMS messages asking for bank details?

    <p>Smishing</p> Signup and view all the answers

    What type of plan would an organization located in a flood zone MOST likely use to document concerns associated with the restoration of IT operations?

    <p>Disaster recovery plan</p> Signup and view all the answers

    In a scenario where DES and 3DES are still being used on recently deployed production servers, what did the security assessment identify?

    <p>Weak encryption</p> Signup and view all the answers

    What is the MOST likely cause of access issues if a security analyst notices an abundance of errors in the datacenter access logs for a fingerprint scanner, correlating with users' reports of issues accessing the facility?

    <p>Cross-over error rate</p> Signup and view all the answers

    When a private organization is forced to close some business units and reduce staffing at others due to a global pandemic, which plan would be BEST to help the organization’s executives determine the next course of action?

    <p>A business continuity plan</p> Signup and view all the answers

    Study Notes

    Social Engineering Techniques

    • Phishing: an SMS asking for bank details on a mobile phone is an example of phishing
    • Social engineering tactics used by attackers in a public Internet forum include:
      • Posting malicious links or malware
      • Gathering sensitive information
      • Spreading misinformation

    Security Assessment

    • Identification of weak encryption: DES and 3DES are still being used on recently deployed production servers
    • Weak encryption poses a security risk to the organization

    Access Issues

    • Errors in datacenter access logs for a fingerprint scanner, correlating with users' reports of issues accessing the facility, are likely caused by:
      • Faulty biometric scanner or incorrect fingerprint reader alignment

    Business Continuity Planning

    • A Business Continuity Plan (BCP) would help an organization's executives determine the next course of action when closing some business units and reducing staffing at others due to a global pandemic
    • A BCP ensures business continuity during crises or disasters

    IT Operations Restoration

    • In a flood zone, an organization would document concerns associated with the restoration of IT operations in a Disaster Recovery Plan (DRP)
    • A DRP outlines procedures for restoring IT operations after a disaster or flood

    Privileged Account Management

    • A solution that meets the requirements of implementing more stringent controls over administrator/root credentials and service accounts includes:
      • Check-in/checkout of credentials
      • Automated password changes
      • Logging of access to credentials

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Prepare for the SY0-601 CompTIA Security+ exam with the newest and valid questions & answers from Certleader. Access 218 Q&As and get ready to ace the exam. Visit Certleader for the leader in IT certification resources.

    More Like This

    Use Quizgecko on...
    Browser
    Browser