Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

SY0-601 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SY0-601 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CompTIA Security+ Exam 2023
  • Last Update: Jun 18, 2025
  • Questions and Answers: 1063
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SY0-601 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SY0-601 Practice Exam Questions with Answers CompTIA Security+ Exam 2023 Certification

Question # 6

Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon

duration of time?

A.

PoC

B.

Production

C.

Test

D.

Development

Full Access
Question # 7

Which of the following would produce the closet experience of responding to an actual incident response scenario?

A.

Lessons learned

B.

Simulation

C.

Walk-through

D.

Tabletop

Full Access
Question # 8

Which of the following controls would be the MOST cost-effective and time-efficient to deter intrusions at the perimeter of a restricted, remote military training area?

(Select TWO).

A.

Barricades

B.

Thermal sensors

C.

Drones

D.

Signage

E.

Motion sensors

F.

Guards

G.

Bollards

Full Access
Question # 9

An analyst Is generating a security report for the management team. Security guidelines recommend disabling all listening unencrypted services. Given this output from Nmap:

SY0-601 question answer

Which of the following should the analyst recommend to disable?

A.

21/tcp

B.

22/tcp

C.

23/tcp

D.

443/tcp

Full Access
Question # 10

A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?

A.

Preventive

B.

Compensating

C.

Corrective

D.

Detective

Full Access
Question # 11

A security administrator wants to implement a program that tests a user's ability to recognize attacks over the organization's email system Which of the following would be BEST suited for this task?

A.

Social media analysis

B.

Annual information security training

C.

Gamification

D.

Phishing campaign

Full Access
Question # 12

Which of the following roles would MOST likely have direct access to the senior management team?

A.

Data custodian

B.

Data owner

C.

Data protection officer

D.

Data controller

Full Access
Question # 13

Which of the following authentication methods is considered to be the LEAST secure?

A.

TOTP

B.

SMS

C.

HOTP

D.

Token key

Full Access
Question # 14

A security analyst was deploying a new website and found a connection attempting to authenticate on the site's portal. While Investigating The incident, the analyst identified the following Input in the username field:

SY0-601 question answer

Which of the following BEST explains this type of attack?

A.

DLL injection to hijack administrator services

B.

SQLi on the field to bypass authentication

C.

Execution of a stored XSS on the website

D.

Code to execute a race condition on the server

Full Access
Question # 15

A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?

A.

Implementation of preventive controls

B.

Implementation of detective controls

C.

Implementation of deterrent controls

D.

Implementation of corrective controls

Full Access
Question # 16

A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?

A.

Containment

B.

Identification

C.

Recovery

D.

Preparation

Full Access
Question # 17

A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims. Which of the following is the researcher MOST likely using?

A.

The Diamond Model of Intrusion Analysis

B.

The Cyber Kill Chain

C.

The MITRE CVE database

D.

The incident response process

Full Access
Question # 18

During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?

A.

1s

B.

chflags

C.

chmod

D.

lsof

E.

setuid

Full Access
Question # 19

A security administrator has discovered that workstations on the LAN are becoming infected with malware. The cause of the infections appears to be users receiving phishing emails that are bypassing the current email-filtering technology. As a result, users are being tricked into clicking on malicious URLs, as no internal controls currently exist in the environment to evaluate their safety. Which of the following would be BEST to implement to address the issue?

A.

Forward proxy

B.

HIDS

C.

Awareness training

D.

A jump server

E.

IPS

Full Access
Question # 20

A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business Which of the following constraints BEST describes the reason the findings cannot be remediated?

A.

inability to authenticate

B.

Implied trust

C.

Lack of computing power

D.

Unavailable patch

Full Access
Question # 21

The Chief Information Security Officer (CISO) has decided to reorganize security staff to concentrate on incident response and to outsource outbound Internet URL categorization and filtering to an outside company. Additionally, the CISO would like this solution to provide the same protections even when a company laptop or mobile device is away from a home office. Which of the following should the CISO choose?

A.

CASB

B.

Next-generation SWG

C.

NGFW

D.

Web-application firewall

Full Access
Question # 22

A network engineer and a security engineer are discussing ways to monitor network operations. Which of the following is the BEST method?

A.

Disable Telnet and force SSH.

B.

Establish a continuous ping.

C.

Utilize an agentless monitor

D.

Enable SNMPv3 With passwords.

Full Access
Question # 23

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO)

A.

MAC filtering

B.

Zero trust segmentation

C.

Network access control

D.

Access control vestibules

E.

Guards

F.

Bollards

Full Access
Question # 24

The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?

A.

Requiring all new, on-site visitors to configure their devices to use WPS

B.

Implementing a new SSID for every event hosted by the college that has visitors

C.

Creating a unique PSK for every visitor when they arrive at the reception area

D.

Deploying a captive portal to capture visitors' MAC addresses and names

Full Access
Question # 25

A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy

A.

Incremental backups followed by differential backups

B.

Full backups followed by incremental backups

C.

Delta backups followed by differential backups

D.

Incremental backups followed by delta backups

E.

Full backup followed by different backups

Full Access
Question # 26

A security engineer is reviewing the logs from a SAML application that is configured to use MFA, during this review the engineer notices a high volume of successful logins that did not require MFA from users who were traveling internationally. The application, which can be accessed without a VPB, has a policy that allows time-based tokens to be generated. Users who changed locations should be required to reauthenticate but have been Which of the following statements BEST explains the issue?

A.

OpenID is mandatory to make the MFA requirements work

B.

An incorrect browser has been detected by the SAML application

C.

The access device has a trusted certificate installed that is overwriting the session token

D.

The user’s IP address is changing between logins, bur the application is not invalidating the token

Full Access
Question # 27

An attacker replaces a digitally signed document with another version that goes unnoticed Upon reviewing the document's contents the author notices some additional verbiage that was not originally in the document but cannot validate an integrity issue. Which of the following attacks was used?

A.

Cryptomalware

B.

Hash substitution

C.

Collision

D.

Phishing

Full Access
Question # 28

During a forensic investigation, a security analyst discovered that the following command was run on a compromised host:

SY0-601 question answer

Which of the following attacks occurred?

A.

Buffer overflow

B.

Pass the hash

C.

SQL injection

D.

Replay attack

Full Access
Question # 29

Which of the following conditions impacts data sovereignty?

A.

Rights management

B.

Criminal investigations

C.

Healthcare data

D.

International operations

Full Access
Question # 30

A company has discovered unauthorized devices are using its WiFi network, and it wants to harden the access point to improve security. Which f the following configuration should an analysis enable

To improve security? (Select TWO.)

A.

RADIUS

B.

PEAP

C.

WPS

D.

WEP-EKIP

E.

SSL

F.

WPA2-PSK

Full Access
Question # 31

A company recently decided to allow its employees to use their personally owned devices for tasks like checking email and messaging via mobile applications. The company would like to use MDM, but employees are concerned about the loss of personal data. Which of the following should the IT department implement to BEST protect the company against company data loss while still addressing the employees’ concerns?

A.

Enable the remote-wiping option in the MDM software in case the phone is stolen.

B.

Configure the MDM software to enforce the use of PINs to access the phone.

C.

Configure MDM for FDE without enabling the lock screen.

D.

Perform a factory reset on the phone before installing the company's applications.

Full Access
Question # 32

A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic. Which of the following should the analyst use?

A.

openssl

B.

hping

C.

netcat

D.

tcpdump

Full Access
Question # 33

Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?

A.

A biometric scanner

B.

A smart card reader

C.

APKItoken

D.

A PIN pad

Full Access
Question # 34

A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted Which of the following resiliency techniques was applied to the network to prevent this attack?

A.

NIC Teaming

B.

Port mirroring

C.

Defense in depth

D.

High availability

E.

Geographic dispersal

Full Access
Question # 35

A junior security analyst is reviewing web server logs and identifies the following pattern in the log file:

SY0-601 question answer

Which ol the following types of attacks is being attempted and how can it be mitigated?

A.

XSS. mplement a SIEM

B.

CSRF. implement an IPS

C.

Directory traversal implement a WAF

D.

SQL infection, mplement an IDS

Full Access
Question # 36

Which of the following environments typically hosts the current version configurations and code, compares user-story responses and workflow, and uses a modified version of actual data for testing?

A.

Development

B.

Staging

C.

Production

D.

Test

Full Access
Question # 37

Which of the following provides a catalog of security and privacy controls related to the United States federal information systems?

A.

GDPR

B.

PCI DSS

C.

ISO 27000

D.

NIST 800-53

Full Access
Question # 38

A security incident has been resolved Which of the following BEST describes the importance of the final phase of the incident response plan?

A.

It examines and documents how well the team responded discovers what caused the incident, and determines how the incident can be avoided in the future

B.

It returns the affected systems back into production once systems have been fully patched, data restored and vulnerabilities addressed

C.

It identifies the incident and the scope of the breach how it affects the production environment, and the ingress point

D.

It contains the affected systems and disconnects them from the network, preventing further spread of the attack or breach

Full Access
Question # 39

A company's help desk received several AV alerts indicating Mimikatz attempted to run on the remote systems Several users also reported that the new company flash drives they picked up in the break room only have 512KB of storage Which of the following is most likely the cause?

A.

The GPO prevents the use of flash drives, which triggers a false positive AV indication and restricts the drives to only 512KB of storage

B.

The new flash drives need a driver that is being blocked by the AV software because the flash drives are not on the application's allow list, temporarily restricting the drives to 512KB of storage.

C.

The new flash drives are incorrectly partitioned, and the systems are automatically trying to use an unapproved application to repartition the drives.

D.

The GPO blocking the flash drives is being bypassed by a malicious flash drive that is attempting to harvest plaintext credentials from memory.

Full Access
Question # 40

To reduce and limit software and infrastructure costs the Chief Information Officer has requested to move email services to the cloud. The cloud provider and the organization must have secunty controls to protect sensitive data Which of the following cloud services would best accommodate the request?

A.

laaS

B.

PaaS

C.

DaaS

D.

SaaS

Full Access
Question # 41

Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?

A.

RTO

B.

MTBF

C.

MTTR

D.

RPO

Full Access
Question # 42

A security analyst reviews a company’s authentication logs and notices multiple authentication failures. The authentication failures are from different usernames that share the same source IP address. Which of the password attacks is MOST likely happening?

A.

Dictionary

B.

Rainbow table

C.

Spraying

D.

Brute-force

Full Access
Question # 43

An organization with a low tolerance for user inconvenience wants to protect laptop hard drives against loss or data theft. Which of the following would be the most acceptable?

A.

SED

B.

HSM

C.

DLP

D.

TPM

Full Access
Question # 44

An incident analyst finds several image files on a hard disk. The image files may contain geolocation coordinates. Which of the following best describes the type of information the analyst is trying to extract from the image files?

A.

Log data

B.

Metadata

C.

Encrypted data

D.

Sensitive data

Full Access
Question # 45

Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?

A.

ISO 27701

B.

The Center for Internet Security

C.

SSAE SOC 2

D.

NIST Risk Management Framework

Full Access
Question # 46

The technology department at a large global company is expanding its Wi-Fi network infrastructure at the headquarters building Which of the following should be closely coordinated between the technology, cybersecurity, and physical security departments?

A.

Authentication protocol

B.

Encryption type

C.

WAP placement

D.

VPN configuration

Full Access
Question # 47

An employee received multiple messages on a mobile device. The messages instructing the employee to pair the device to an unknown device. Which of the following BEST describes What a malicious person might be doing to cause this issue to occur?

A.

Jamming

B.

Bluesnarfing

C.

Evil twin

D.

Rogue access point

Full Access
Question # 48

A security administrator is working on a solution to protect passwords stored in a database against rainbow table attacks Which of the following should the administrator consider?

A.

Hashing

B.

Salting

C.

Lightweight cryptography

D.

Steganography

Full Access
Question # 49

Which of the following environment utilizes dummy data and is MOST to be installed locally on a system that allows to be assessed directly and modified easily wit each build?

A.

Production

B.

Test

C.

Staging

D.

Development

Full Access
Question # 50

Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?

A.

The key length of the encryption algorithm

B.

The encryption algorithm's longevity

C.

A method of introducing entropy into key calculations

D.

The computational overhead of calculating the encryption key

Full Access
Question # 51

A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host:

SY0-601 question answer

Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?

A.

Denial of service

B.

ARP poisoning

C.

Command injection

D.

MAC flooding

Full Access
Question # 52

Which of the following biometric authentication methods is the MOST accurate?

A.

Gait

B.

Retina

C.

Signature

D.

Voice

Full Access
Question # 53

Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?

A.

Production

B.

Test

C.

Staging

D.

Development

Full Access
Question # 54

Which of the following incident response steps occurs before containment?

A.

Eradication

B.

Recovery

C.

Lessons learned

D.

Identification

Full Access
Question # 55

A company recently experienced an attack during which 5 main website was directed to the atack-er’s web server, allowing the attacker to harvest credentials from unsuspecting customers. Which of the following should the company Implement to prevent this type of attack from occurring in the future?

A.

IPSec

B.

SSL/TLS

C.

DNSSEC

D.

S/MIME

Full Access
Question # 56

A cybersecurity administrator needs to implement a Layer 7 security control on a network and block potential attacks. Which of the following can block an attack at Layer 7? (Select TWO).

A.

HIDS

B.

NIPS

C.

HSM

D.

WAF

E.

NAC

F.

NIDS

G.

Stateless firewall

Full Access
Question # 57

A security analyst is investigating a phishing email that contains a malicious document directed to the company's Chief Executive Officer (CEO). Which of the following should the analyst perform to understand the threat and retrieve possible IoCs?

A.

Run a vulnerability scan against the CEOs computer to find possible vulnerabilities

B.

Install a sandbox to run the malicious payload in a safe environment

C.

Perform a traceroute to identify the communication path

D.

Use netstat to check whether communication has been made with a remote host

Full Access
Question # 58

A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a

laptop stolen, and later, enterprise data was found to have been compromised from a local database. Which of the following was the

MOST likely cause?

A.

Shadow IT

B.

Credential stuffing

C.

SQL injection

D.

Man in the browser

E.

Bluejacking

Full Access
Question # 59

A Chief Information Officer is concerned about employees using company-issued laptops lo steal data when accessing network shares. Which of the following should the company Implement?

A.

DLP

B.

CASB

C.

HIDS

D.

EDR

E.

UEFI

Full Access
Question # 60

After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

A.

A DMZ

B.

A VPN a

C.

A VLAN

D.

An ACL

Full Access
Question # 61

Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?

A.

Unsecured root accounts

B.

Zero day

C.

Shared tenancy

D.

Insider threat

Full Access
Question # 62

After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:

A.

privilege escalation

B.

footprinting

C.

persistence

D.

pivoting.

Full Access
Question # 63

Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?

A.

Pulverizing

B.

Shredding

C.

Incinerating

D.

Degaussing

Full Access
Question # 64

A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again.

Which of the following is the BEST technical implementation to prevent this from happening again?

A.

Configure DLP solutions

B.

Disable peer-to-peer sharing

C.

Enable role-based

D.

Mandate job rotation

E.

Implement content filters

Full Access
Question # 65

A systems administrator set up an automated process that checks for vulnerabilities across the entire environment every morning. Which of the following activities is the systems administrator conducting?

A.

Scanning

B.

Alerting

C.

Reporting

D.

Archiving

Full Access
Question # 66

A company is designing the layout of a new data center so it will have an optimal environmental temperature Which of the following must be included? (Select two).

A.

An air gap

B.

A cold aisle

C.

Removable doors

D.

A hot aisle

E.

An loT thermostat

F.

A humidity monitor

Full Access
Question # 67

Which of the following identifies the point in time when an organization will recover data in the event of an outage?

A.

SLA

B.

RPO

C.

MTBF

D.

ARO

Full Access
Question # 68

An organization is moving away from the use of client-side and server-side certificates for EAR The company would like for the new EAP solution to have the ability to detect rogue access points. Which of the following would accomplish these requirements?

A.

PEAP

B.

EAP-FAST

C.

EAP-TLS

D.

EAP-TTLS

Full Access
Question # 69

A new security engineer has started hardening systems. One of the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability to use SCP to transfer files to the NAS, even through the data is still viewable from the user’s PCs. Which of the following is the most likely cause of this issue?

A.

TFTP was disabled on the local hosts

B.

SSH was turned off instead of modifying the configuration file

C.

Remote login was disabled in the networkd.config instead of using the sshd.conf

D.

Network services are no longer running on the NAS

Full Access
Question # 70

A company installed several crosscut shredders as part of increased information security practices targeting data leakage risks. Which of the following will this practice reduce?

A.

Dumpster diving

B.

Shoulder surfing

C.

Information elicitation

D.

Credential harvesting

Full Access
Question # 71

A company wants to reconfigure an existing wireless infrastructure. The company needs to ensure the projected WAP placement will provide proper signal strength to all workstations. Which of the following should the company use to best fulfill the requirements?

A.

Network diagram

B.

WPS

C.

802.1X

D.

Heat map

Full Access
Question # 72

While reviewing pcap data, a network security analyst is able to locate plaintext usernames and passwords being sent from workstations to network witches. Which of the following is the security analyst MOST likely observing?

A.

SNMP traps

B.

A Telnet session

C.

An SSH connection

D.

SFTP traffic

Full Access
Question # 73

Security analysts notice a server login from a user who has been on vacation for two weeks, The an-alysts confirm that the user did not log in to the system while on vacation After reviewing packet capture the analysts notice the following:

Which of the following occurred?

A.

A buffer overflow was exploited to gain unauthorized access.

B.

The user's account was con-promised, and an attacker changed the login credentials.

C.

An attacker used a pass-the-hash attack to gain access.

D.

An insider threat with username logged in to the account.

Full Access
Question # 74

A systems administrator needs to set up a secure, cloud-based file transfer environment between two data centers. Which of the following architecture models would meet this requirement?

A.

FTP

B.

HSM

C.

SDN

D.

PKI

Full Access
Question # 75

An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10 50 10.25

Which of the following firewall ACLs will accomplish this goal?

A.

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port S3

Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port S3

B.

Access list outbound permit 0.0.0.0/0 10.50.10.2S/32 port S3

Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53

C.

Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53

Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53

D.

Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port S3

Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port S3

Full Access
Question # 76

Which of the following scenarios best describes a risk reduction technique?

A.

A security control objective cannot be met through a technical change, so the company purchases insurance and is no longer concerned about losses from data breaches

B.

A security control objective cannot be met through a technical change, so the company implements a pokey to train users on a more secure method of operation

C.

A security control objective cannot be met through a technical change, so the company performs regular audits to determine it violations have occurred

D.

A security control objective cannot be met through a technical change, so the Chief Information Officer decides to sign off on the risk.

Full Access
Question # 77

During an incident, an EDR system detects an increase in the number of encrypted outbound connections from multiple hosts. A firewall is also reporting an increase in outbound connections that use random high ports. An

analyst plans to review the correlated logs to find the source of the incident. Which of the following tools will best assist the analyst?

A.

A vulnerability scanner

B.

A NGFW

C.

The Windows Event Viewer

D.

A SIEM

Full Access
Question # 78

A security analyst reviews web server logs and notices the following lines:

104.35.45.53 - - [22/May/2020:06:57:31 +0100] "GET /show_file.php file=%2e%2e%2f%2e%2e%2fetc%2fpasswd HTTP/1.1" 200 11705

"http://www.example.com/downloadreport.php "

104.35.45.53 -- [22/May/2020:07:00:58 +0100] "GET /show_file.php

file=%2e%2e%2f%2e%2e%2fetc%2fsudoers HTTP/1.1" 200 23713

"http://www.example.com/downloadreport.php "

Which of the following vulnerabilities has the attacker exploited? (Select TWO).

A.

Race condition

B.

LFI

C.

Pass the hash

D.

XSS

E.

RFI

F.

Directory traversal

Full Access
Question # 79

Which of the following would be the best resource for a software developer who is looking to improve secure coding practices for web applications?

A.

OWASP

B.

Vulnerability scan results

C.

NIST CSF

D.

Third-party libraries

Full Access
Question # 80

A security architect is designing a remote access solution for a business partner. The business partner needs to access one Linux server at the company. The business partner wants to avid managing a password for authentication and additional software installation. Which of the following should the architect recommend?

A.

Soft token

B.

Smart card

C.

CSR

D.

SSH key

Full Access
Question # 81

A cybersecurity analyst reviews the log files from a web server end sees a series of files that indicate a directory traversal attack has occurred Which of the following is the analyst most likely seeing?

A.

SY0-601 question answer

B.

SY0-601 question answer

C.

SY0-601 question answer

D.

SY0-601 question answer

Full Access
Question # 82

The primary goal of the threat-hunting team at a large company is to identify cyberthreats that the SOC has not detected. Which of the following types of data would the threat-hunting team primarily use to identify systems that are exploitable?

A.

Vulnerability scan

B.

Packet capture

C.

Threat feed

D.

User behavior

Full Access
Question # 83

Which of the following test helps to demonstrate integrity during a forensics investigation?

A.

Event logs

B.

Encryption

C.

Hashing

D.

Snapshots

Full Access
Question # 84

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?

A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks. Which of the following analysis elements did the company most likely use in making this decision?

A.

MTTR

B.

RTO

C.

ARO

D.

MTBF

Full Access
Question # 85

A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would most likely have prevented this breach?

A.

A firewall

B.

A device pin

C.

A USB data blocker

D.

Biometrics

Full Access
Question # 86

A security analyst discovers several jpg photos from a cellular phone during a forensics investigation involving a compromised system The analyst runs a forensics tool to gather file metadata Which of the following would be part of the images if all the metadata is still intact?

A.

The GSS location

B.

When the file was deleted

C.

The total number of print jobs

D.

The number of copies made

Full Access
Question # 87

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

A.

Implementing a bastion host

B.

Deploying a perimeter network

C.

Installing a WAF

D.

Utilizing single sign-on

Full Access
Question # 88

An administrator reviewed the log files after a recent ransomware attack on a company's system and discovered vulnerabilities that resulted in the loss of a database server. The administrator applied a patch to the server to resolve the CVE score. Which of the following controls did the administrator use?

A.

Corrective

B.

Deterrent

C.

Compensating

D.

Directive

Full Access
Question # 89

Several universities are participating in a collaborative research project and need to share compute and storage resources. Which of the following cloud deployment strategies would best meet this need?

A.

Community

B.

Private

C.

Public

D.

Hybrid

Full Access
Question # 90

Local guidelines require that all information systems meet a minimum security baseline to be compliant Which of the following can security administrators use to assess their system configurations against the baseline?

A.

SOAR playbook

B.

Security control matrix

C.

Risk management framework

D.

Benchmarks

Full Access
Question # 91

An endpoint protection application contains critical elements that are used to protect a system from infection. Which of the following must be updated before completing a weekly endpoint check?

A.

Policy engine

B.

Policy updates

C.

Policy definitions

D.

Policy signatures

Full Access
Question # 92

A company deployed a Wi-Fi access point in a public area and wants to harden the configuration to make it more secure. After performing an assessment, an analyst identifies that the access point is configured to use WPA3, AES, WPS, and RADIUS. Which of the following should the analyst disable to enhance the access point security?

A.

WPA3

B.

AES

C.

RADIUS

D.

WPS

Full Access
Question # 93

A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer data. Which of the following would provide the best proof that the hosting provider has met the requirements?

A.

NIST CSF

B.

SOC 2 Type 2 report

C.

CIS Top 20 compliance reports

D.

Vulnerability report

Full Access
Question # 94

The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact. Which of the following BEST meets the requirements?

A.

Warm-site failover

B.

Tabletop walk-through

C.

Parallel path testing

D.

Full outage simulation

Full Access
Question # 95

Adding a value to the end of a password to create a different password hash is called:

A.

salting.

B.

key stretching.

C.

steganography.

D.

MD5 checksum.

Full Access
Question # 96

A malicious actor compromised an entire cluster by exploiting a zero-day vulnerability in a unique container. The malicious actor then engaged in a lateral movement and compromised other containers and the host system. Which of the following container security practices has the GREATEST chance of preventing this attack from reoccurring?

A.

Deploying an IPS with updated signatures in line with the container cluster

B.

Implementing automatic scalability for containers exposed to the internet

C.

Updating the environment by using images with the tag: latest

D.

Executing containers using unprivileged credentials

Full Access
Question # 97

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

A.

Compromise

B.

Retention

C.

Analysis

D.

Transfer

E.

Inventory

Full Access
Question # 98

An organization suffered numerous multiday power outages at its current location. The Chief Executive Officer wants to create a disaster recovery strategy to resolve this issue. Which of the following options offer low-cost solutions? (Select two).

A.

Warm site

B.

Generator

C.

Hot site

D.

Cold site

E.

Cloud backups

F.

UPS

Full Access
Question # 99

An analyst is trying to identify insecure services that are running on the internal network. After performing a port scan, the analyst identifies that a server has some insecure services enabled on default ports. Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them? (Select THREE).

A.

SFTP, FTPS

B.

SNMPv2, SNMPv3

C.

HTTP, HTTPS

D.

TFTP, FTP

E.

SNMPW1, SNMPv2

F.

Telnet, SSH

G.

TLS, SSL

Full Access
Question # 100

A security analyst is reviewing the following command-line output:

Internet address Physical address Type

192.168.1.1 aa-bb-cc-00-11-22 dynamic

192.168. aa-bb-cc-00-11-22 dynamic

192.168.1.3 aa-bb-cc-00-11-22 dynamic

192.168.1.4 aa-bb-cc-00-11-22 dynamic

192.168.1.5 aa-bb-cc-00-11-22 dynamic

--output omitted---

192.168.1.251 aa-bb-cc-00-11-22 dynamic

192.168.1.252 aa-bb-cc-00-11-22 dynamic

192.168.1.253 aa-bb-cc-00-11-22 dynamic

192.168.1.254 aa-bb-cc-00-11-22 dynamic

192.168.1.255 ff-ff-ff-ff-ff-ff static

Which of the following is the analyst observing?

A.

ICMP spoofing

B.

URL redirection

C.

MAC address cloning

D.

DNS poisoning

Full Access
Question # 101

A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:

SY0-601 question answer

Which of the following best describes this kind of attack?

A.

Directory traversal

B.

SQL injection

C.

API

D.

Request forgery

Full Access
Question # 102

Which of the following supplies non-repudiation during a forensics investigation?

A.

Dumping volatile memory contents first

B.

Duplicating a drive with dd

C.

a SHA 2 signature of a drive image

D.

Logging everyone in contact with evidence

E.

Encrypting sensitive data

Full Access
Question # 103

The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:

A.

data controller

B.

data owner.

C.

data custodian.

D.

data processor

Full Access
Question # 104

A company is expanding its threat surface program and allowing individuals to security test the company's internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

A.

Open-source intelligence

B.

Bug bounty

C.

Red team

D.

Penetration testing

Full Access
Question # 105

Which of the following teams combines both offensive and defensive testing techniques to protect an organization's critical systems?

A.

Red

B.

Blue

C.

Purple

D.

Yellow

Full Access
Question # 106

Which of the following best describes configuring devices to log to a centralized, off-site location for possible future reference?

A.

Log aggregation

B.

DLP

C.

Archiving

D.

SCAP

Full Access
Question # 107

The concept of connecting a user account across the systems of multiple enterprises is best known as:

A.

federation

B.

a remote access policy.

C.

multifactor authentication

D.

single sign-on.

Full Access
Question # 108

A software company adopted the following processes before releasing software to production

• Peer review

• Static code scanning

• Signing

A considerable number of vulnerabilities are still being detected when code is executed on production Which of the following security tools can improve vulnerability detection on this environment?

A.

File integrity monitoring for the source code

B.

Dynamic code analysis tool

C.

Encrypted code repository

D.

Endpoint detection and response solution

Full Access
Question # 109

A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control of the computer systems anonymously while obtaining sensitive corporate and personal employee information. Which of the following methods did the attacker most likely use to gain access?

A.

A bol

B.

A fileless virus

C.

A logic bomb

D.

A RAT

Full Access
Question # 110

Employees in the research and development business unit receive extensive training 10 ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

A.

Encrypted

B.

Intellectual property

C.

Critical

D.

Data in transit

Full Access
Question # 111

An internet company has created a new collaboration application. To expand the user base, the company wants to implement an option that allows users to log in to the application with the

credentials of her popular websites. Which of the following should the company implement?

A.

SSO

B.

CHAP

C.

802.1X

D.

OpenlD

Full Access
Question # 112

Which of the following agreements defines response time, escalation points, and performance metrics?

A.

BPA

B.

MOA

C.

NDA

D.

SLA

Full Access
Question # 113

A security analyst is working with the IT group to define appropriate procedures for the destruction of media and assets in the enterprise environment. Which of the following methods provides the strongest level of assurance that the data has been disposed of properly?

A.

Degaussing

B.

Multipass wipe

C.

Hashing

D.

Erasure

E.

Shredding

Full Access
Question # 114

Recent changes to a company's BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?

A.

Facial recognition

B.

Six-digit PIN

C.

PKI certificate

D.

Smart card

Full Access
Question # 115

An organization's Chief Security Officer (CSO) wants to validate the business's involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO most likely use?

A.

An external security assessment

B.

A bug bounty program

C.

A tabletop exercise

D.

A red-team engagement

Full Access
Question # 116

While checking logs, a security engineer notices a number of end users suddenly downloading files with the.tar.gz extension-Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following is MOST likely occurring?

A.

A RAT was installed and is transferring additional exploit tools.

B.

The workstations are beaconing to a command-and-control server.

C.

A logic bomb was executed and is responsible for the data transfers

D.

A fileless virus is spreading in the local network environment.

Full Access
Question # 117

A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs, the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be best for the security manager to implement while maintaining alerting capabilities?

A.

Segmentation

B.

Firewall allow list

C.

Containment

D.

Isolation

Full Access
Question # 118

Which of the following scenarios describes a possible business email compromise attack?

A.

An employee receives a gift card request m an email that has an executive's name m the display held to the email

B.

Employees who open an email attachment receive messages demanding payment m order to access files

C.

A service desk employee receives an email from the HR director asking for log-in credentials lo a cloud administrator account

D.

An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.

Full Access
Question # 119

A security analyst is taking part in an evaluation process that analyzes and categorizes threat actors Of real-world events in order to improve the incident response team's process. Which Of the following is the analyst most likely participating in?

A.

MITRE ATT&CK

B.

Walk-through

C.

Red team

D.

Purple team-I

E.

TAXI

Full Access
Question # 120

After multiple on-premises security solutions were migrated to the cloud, the incident response time increased The analysts are spending a long time trying to trace information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?

A.

CASB

B.

VPC

C.

SWG

D.

CMS

Full Access
Question # 121

An organization has expanded its operations by opening a remote office. The new office is fully furnished with office resources to support up to 50 employees working on any given day. Which of the following VPN solutions would best support the new office?

A.

Always-on

B.

Remote access

C.

Site-to-site

D.

Full tunnel

Full Access
Question # 122

A cyber security administrator is using iptables as an enterprise firewall. The administrator created some rules, but the network now seems to be unresponsive. All connections are being dropped by the firewall Which of the following would be the best option to remove the rules?

A.

# iptables -t mangle -X

B.

# iptables -F

C.

# iptables -2

D.

# iptables -P INPUT -j DROP

Full Access
Question # 123

A security analyst receives an alert from the company's S1EM that anomalous activity is coming from a local source IP address of 192 168 34.26 The Chief Information Security Officer asks the analyst to block the originating source Several days later another employee opens an internal ticket stating that vulnerability scans are no longer being performed property. The IP address the employee provides is 192 168.34 26. Which of the following describes this type of alert?

A.

True positive

B.

True negative

C.

False positive

D.

False negative

Full Access
Question # 124

A web architect would like to move a company's website presence to the cloud. One of the management team's key concerns is resiliency in case a cloud provider's data center or network connection goes down. Which of the following should the web architect consider to address this concern?

A.

Containers

B.

Virtual private cloud

C.

Segmentation

D.

Availability zones

Full Access
Question # 125

A building manager is concerned about people going in and out of the office during non-working hours. Which of the following physical security controls would provide the best solution?

A.

Cameras

B.

Badges

C.

Locks

D.

Bollards

Full Access
Question # 126

A user downloaded an extension for a browser, and the user's device later became infected. The analyst who Is Investigating the Incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running:

New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -Driveletter C - FileSystemLabel "New"-FileSystem NTFS - Full -Force -Confirm:$false

Which of the following is the malware using to execute the attack?

A.

PowerShell

B.

Python

C.

Bash

D.

Macros

Full Access
Question # 127

A security analyst needs to implement security features across smartphones. laptops, and tablets. Which of the following would be the most effective across heterogeneous platforms?

A.

Enforcing encryption

B.

Deploying GPOs

C.

Removing administrative permissions

D.

Applying MDM software

Full Access
Question # 128

A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would best support the policy?

A.

Mobile device management

B.

Full device encryption

C.

Remote wipe

D.

Biometrics

Full Access
Question # 129

Which of the following threat actors is most likely to be motivated by ideology?

A.

Business competitor

B.

Hacktivist

C.

Criminal syndicate

D.

Script kiddie

E.

Disgruntled employee

Full Access
Question # 130

A network penetration tester has successfully gained access to a target machine. Which of the following should the penetration tester do next?

A.

Clear the log files of all evidence

B.

Move laterally to another machine.

C.

Establish persistence for future use.

D.

Exploit a zero-day vulnerability.

Full Access
Question # 131

A company is implementing MFA for all applications that store sensitive data. The IT manager wants MFA to be non-disruptive and user friendly Which of the following technologies should the IT manager use when implementing MFA?

A.

One-time passwords

B.

Email tokens

C.

Push notifications

D.

Hardware authentication

Full Access
Question # 132

A network engineer is troubleshooting wireless network connectivity issues that were reported by users The issues are occurring only in the section of the building that is closest to the parking lot. Users are intermittently experiencing slow speeds when accessing websites and are unable to connect to network drives. The issues appear to increase when laptop users return to their desks after using their devices in other areas of the building There have also been reports of users being required to enter their credentials on web pages in order to gain access to them Which of the following is the most likely cause of this issue?

A.

An external access point is engaging in an evil-Twin attack

B.

The signal on the WAP needs to be increased in that section of the building

C.

The certificates have expired on the devices and need to be reinstalled

D.

The users in that section of the building are on a VLAN that is being blocked by the firewall

Full Access
Question # 133

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

A.

Testing input validation on the user input fields

B.

Performing code signing on company-developed software

C.

Performing static code analysis on the software

D.

Ensuring secure cookies are used

Full Access
Question # 134

Which of the following describes the exploitation of an interactive process to gain access to restricted areas?

A.

Persistence

B.

Port scanning

C.

Privilege escalation

D.

Pharming

Full Access
Question # 135

The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access Which of the following is the BEST security solution to reduce this risk?

A.

CASB

B.

VPN concentrator

C.

MFA

D.

VPC endpoint

Full Access
Question # 136

A company needs to centralize its logs to create a baseline and have visibility on its security events Which of the following technologies will accomplish this objective?

A.

Security information and event management

B.

A web application firewall

C.

A vulnerability scanner

D.

A next-generation firewall

Full Access
Question # 137

A user reports constant lag and performance issues with the wireless network when working at a local coffee shop A security analyst walks the user through an installation of Wireshark and gets a five-minute pcap to analyze. The analyst observes the following output:

SY0-601 question answer

Which of the following attacks does the analyst most likely see in this packet capture?

A.

Session replay

B.

Evil twin

C.

Bluejacking

D.

ARP poisoning

Full Access
Question # 138

An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to Implement mitigation techniques to prevent further spread. Which of the following is the best course of action for the analyst to take?

A.

Apply a DLP solution.

B.

Implement network segmentation.

C.

Utilize email content filtering.

D.

Isolate the infected attachment.

Full Access
Question # 139

Which Of the following is a primary security concern for a setting up a BYOD program?

A.

End of life

B.

Buffer overflow

C.

VM escape

D.

Jailbreaking

Full Access
Question # 140

A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the following entries:

SY0-601 question answer

Which of the following password attacks is taking place?

A.

Dictionary

B.

Brute-force

C.

Rainbow table

D.

Spraying

Full Access
Question # 141

A government organization is developing an advanced Al defense system. Develop-ers are using information collected from third-party providers Analysts are no-ticing inconsistencies in the expected powers Of then learning and attribute the Outcome to a recent attack on one of the suppliers. Which of the following IS the most likely reason for the inaccuracy of the system?

A.

Improper algorithms security

B.

Tainted training data

C.

virus

D.

Cryptomalware

Full Access
Question # 142

Which of the following is constantly scanned by internet bots and has the highest risk of attack in the case of the default configurations?

A.

Wearable sensors

B.

Raspberry Pi

C.

Surveillance systems

D.

Real-time operating systems

Full Access
Question # 143

Cloud security engineers are planning to allow and deny access to specific features in order to in-crease data security. Which of the following cloud features is the most appropriate to ensure ac-cess is granted properly?

A.

API integrations

B.

Auditing

C.

Resource policies

D.

Virtual networks

Full Access
Question # 144

A large retail store's network was breached recently. and this news was made public. The Store did not lose any intellectual property, and no customer information was stolen. Although no fines were incurred as a result, the Store lost revenue after the breach. Which of the following is the

most likely reason for this issue?

A.

Employee training

B.

Leadership changes

C.

Reputation

D.

Identity theft

Full Access
Question # 145

Which of the following automation use cases would best enhance the security posture Of an organi-zation by rapidly updating permissions when employees leave a company Or change job roles inter-nally?

A.

Provisioning resources

B.

Disabling access

C.

APIs

D.

Escalating permission requests

Full Access
Question # 146

Which of the following roles is responsible for defining the protection type and Classification type for a given set of files?

A.

General counsel

B.

Data owner

C.

Risk manager

D.

Chief Information Officer

Full Access
Question # 147

A security engineer is setting up passwordless authentication for the first time.

INSTRUCTIONS

Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

SY0-601 question answer

Full Access
Question # 148

A company wants the ability to restrict web access and monitor the websites that employees visit, Which Of the following would best meet these requirements?

A.

Internet Proxy

B.

VPN

C.

WAF

D.

Firewall

Full Access
Question # 149

Earlier in the week, the CSIRT was alerted to a cyber-incident. The CSIRT is now interacting with the affected systems in an attempt to stop further damage. Which of the following best describes this phase of the incident response process?

A.

Preparation

B.

Containment

C.

Recovery

D.

Eradication

Full Access
Question # 150

A user would like to install software and features that are not available with a smartphone's default software. Which of the following would allow the user to install unauthorized software and enable new features?

A.

SQLi

B.

Cross-site scripting

C.

Jailbreaking

D.

Side loading

Full Access
Question # 151

Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?

A.

Impact analysis

B.

Scheduled downtime

C.

Blackout plan

D.

Change management boards

Full Access
Question # 152

Which of the following would best enable a systems administrator to easily determine which devices are located at a remote facility and allow policy to be pushed to only those devices?

A.

Baseline configurations

B.

Network diagrams

C.

Standard naming conventions

D.

Hot sites

Full Access
Question # 153

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

A.

Bluetooth

B.

Wired

C.

NFC

D.

SCADA

Full Access
Question # 154

An analyst observed an unexpected high number of DE authentication on requests being sent from an unidentified device on the network. Which of the following attacks was most likely executed in this scenario?

A.

Jamming

B.

Blue jacking

C.

Rogue access point

D.

Disassociation

Full Access
Question # 155

After conducting a vulnerability scan a systems administrator notices that one of the identified vulnerabilities is not present on the systems that were scanned. Which of the following describes this example?

A.

False positive

B False negative

B.

True positive

C.

True negative

Full Access
Question # 156

A company would like to enhance the authentication technologies being used by remote employees Which of the following should the company most likely choose?

A.

Token key

B.

Iris scan

C.

Gait analysis

D.

Voice recognition

Full Access
Question # 157

An external vendor recently visited a company's headquarters for a presentation. Following the visit, a member of the hosting team found a file that the external vendor left behind on a server. The file contained detailed architecture information and code snippets. Which of the following data types best describes this file?

A.

Government

B.

Public

C.

Proprietary

D.

Critical

Full Access
Question # 158

While performing digital forensics, which of the following is considered the most volatile and should have the contents collected first?

A.

Hard drive

B.

RAM

C.

SSD

D.

Temporary files

Full Access
Question # 159

A company uses a SaaS vendor to host its customer database. The company would like to reduce the risk of customer data exposure if the systems are breached. Which of the following risks should the company focus on to achieve this objective?

A.

Weak encryption

B.

Outsourced code development

C.

Supply chain

D.

Open ports and services

Full Access
Question # 160

The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?

A.

Guard rail script

B.

Ticketing workflow

C.

Escalation script

D.

User provisioning script

Full Access
Question # 161

A company needs to keep the fewest records possible meet compliance needs, and ensure destruction of records that are no longer needed Which of the following best describes the policy that meets these requirements?

A.

Security policy

B.

Classification policy

C.

Retention policy

D.

Access control policy

Full Access
Question # 162

A company would like to implement a network security solution to inspect traffic on the network and generate an alert when specific traffic patterns are observed. The solution should never block legitimate network traffic. Which of the following will the company most likely implement?

A.

NIDS

B.

HIPS

C.

ACLs

D.

WAF

Full Access
Question # 163

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

A.

Fines

B.

Audit findings

C.

Sanctions

D.

Reputation damage

Full Access
Question # 164

A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

A.

DDoS

B.

Privilege escalation

C.

DNS poisoning

D.

Buffer overflow

Full Access
Question # 165

A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software compatibility issues. The OSs are still supported by the vendor but the industrial software is no longer supported The Chief Information Security Officer has created a resiliency plan for these systems that will allow OS patches to be installed in a non-production environment, white also creating backups of the systems for recovery. Which of the following resiliency techniques will provide these capabilities?

A.

Redundancy

B.

RAID 1+5

C.

Virtual machines

D.

Full backups

Full Access
Question # 166

A company is utilizing an offshore team to help support the finance department. The company wants to keep the data secure by keeping it on a company device but does not want to provide equipment to the offshore team. Which of the following should the company implement to meet this requirement?

A.

VDI

B.

MDM

C.

VPN

D.

VPC

Full Access
Question # 167

A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?

A.

Enumeration

B.

Sanitization

C.

Destruction

D.

Inventory

Full Access
Question # 168

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?

A.

ACL

B.

DLP

C.

IDS

D.

IPS

Full Access
Question # 169

Which of the following is a common source of unintentional corporate credential leakage in cloud environments?

A.

Code repositories

B.

Dark web

C.

Threat feeds

D.

State actors

E.

Vulnerability databases

Full Access
Question # 170

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

A.

Insurance

B.

Patching

C.

Segmentation

D.

Replacement

Full Access
Question # 171

The Chief Information Security Officer wants to put security measures in place to protect Pll. The organization needs to use its existing labeling and classification system to accomplish this goal. Which of the following would most likely be configured to meet the requirements?

A.

Tokenization

B.

S/MIME

C.

DLP

D.

MFA

Full Access
Question # 172

An analyst in the human resources organization is responsible for the quality of the company's personnel data. The analyst maintains a data dictionary and ensures it is correct and up to date Which of the following best describes the role of the analyst?

A.

Data steward

B.

Data owner

C.

Data processor

D.

Data protection officer

Full Access
Question # 173

Which of the following is a method used by some organizations to recognize and compensate security researchers for finding exploits and vulnerabilities?

A.

Red team

B.

Foot printing

C.

Bug bounty

D.

Lateral movement

Full Access
Question # 174

A security analyst is preparing a report that details the circumstances that led to a security incident and steps that can be taken in the future to prevent recurrence. Which of the following best describes this phase of the incident response process?

A.

Lessons learned

B.

Identification

C.

Recovery

D.

Containment

Full Access
Question # 175

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

A.

Penetration test

B.

Continuity of operations planning

C.

Tabletop exercise

D.

Simulation

Full Access
Question # 176

Which of the following alert types is the most likely to be ignored over time?

A.

True positive

B.

True negative

C.

False positive

D.

False negative

Full Access
Question # 177

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?

A.

Risk tolerance

B.

Risk acceptance

C.

Risk importance

D.

Risk appetite

Full Access
Question # 178

Which of the following is the first step to take when creating an anomaly detection process?

A.

Selecting events

B.

Building a baseline

C.

Selecting logging options

D.

Creating an event log

Full Access
Question # 179

An organization has hired a security analyst to perform a penetration test The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pcap back to the machine for

analysis. Which of the following tools should the analyst use to further review the pcap?

A.

Nmap

B.

CURL

C.

Neat

D.

Wireshark

Full Access
Question # 180

An organization's corporate offices were destroyed due to a natural disaster, so the organization is now setting up offices in a temporary work space. Which of the following will the organization most likely consult?

A.

The business continuity plan

B.

The risk management plan

C.

The communication plan

D.

The incident response plan

Full Access
Question # 181

Which of the following is a primary security concern for a company setting up a BYOD program?

A.

End of life

B.

Buffer overflow

C.

VM escape

D.

Jailbreaking

Full Access
Question # 182

An analyst is reviewing log data from a SIEM alert about a suspicious event Threat intelligence indicates threats from domains originating in known malicious countries The analyst examines the following data.

SY0-601 question answer

The Chief information Security Officer asks the analyst determine whether the SIEM alerts can be attributed to the domains m the threat intelligence report. Which of the following tools would b«ii allow the analyst to make this determination?

A.

nsleskup

B.

netstat

C.

curl

D.

arp

Full Access
Question # 183

Which of the following assists in training employees on the importance of cybersecurity?

A.

Phishing campaigns

B.

Acceptable use policy

C.

Employee handbook

D.

Social media analysis

Full Access
Question # 184

Which of the following should a security operations center use to improve. Which of the following access controls is most likely inhibiting the transfer?

A.

Attribute-based

B.

Time of day

C.

Role-based

D.

Least privilege

Full Access
Question # 185

Which of the following security concepts should an e-commerce organization apply for protection against erroneous purchases?

A.

Privacy

B.

Availability

C.

Integrity

D.

Confidentiality

Full Access
Question # 186

An audit report indicates multiple suspicious attempts to access company resources were made. These attempts were not detected by the company. Which of the following would be the best solution to implement on the company's network?

A.

Intrusion prevention system

B.

Proxy server

C.

Jump server

D.

Security zones

Full Access
Question # 187

An administrator is configuring a firewall rule set for a subnet to only access DHCP, web pages, and SFTP, and to specifically block FTP. Which of the following would BEST accomplish this goal?

A.

[Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Allow: Any Any 67 -Allow: Any Any 68 -Allow: Any Any 22 -Deny: Any Any 21 -Deny: Any Any

B.

[Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Allow: Any Any 67 -Allow: Any Any 68 -Deny: Any Any 22 -Allow: Any Any 21 -Deny: Any Any

C.

[Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Allow: Any Any 22 -Deny: Any Any 67 -Deny: Any Any 68 -Deny: Any Any 21 -Allow: Any Any

D.

[Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Deny: Any Any 67 -Allow: Any Any 68 -Allow: Any Any 22 -Allow: Any Any 21 -Allow: Any Any

Full Access
Question # 188

A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?

A.

SMIME

B.

LDAPS

C.

SSH

D.

SRTP

Full Access
Question # 189

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

A.

Compensating control

B.

Network segmentation

C.

Transfer of risk

D.

SNMP traps

Full Access
Question # 190

Which of the following can best protect against an employee inadvertently installing malware on a company system?

A.

Host-based firewall

B.

System isolation

C.

Least privilege

D.

Application allow list

Full Access
Question # 191

Which of the following should a security operations center use to improve its incident response procedure?

A.

Playbooks

B.

Frameworks

C.

Baselines

D.

Benchmarks

Full Access
Question # 192

A systems administrator would like to set up a system that will make it difficult or impossible to deny that someone has performed an action. Which of the following is the administrator trying to accomplish?

A.

Non-repudiation

B.

Adaptive identity

C.

Security zones

D.

Deception and disruption

Full Access
Question # 193

A server administrator is reporting performance issues when accessing all internal resources. Upon further investigation, the security team notices the following:

• A user’s endpoint has been compromised and is broadcasting its MAC as the default gateway's MAC throughout the LAN.

• Traffic to and from that endpoint is significantly greater than all other similar endpoints on the LAN.

• Network ports on the LAN are not properly configured.

• Wired traffic is not being encrypted properly.

Which of the following attacks is most likely occurring?

A.

DDoS

B.

MAC flooding

C.

ARP poisoning

D.

DHCP snooping

Full Access
Question # 194

Which of the following best describes a social engineering attack that uses a targeted electronic messaging campaign aimed at a Chief Executive Officer?

A.

Whaling

B.

Spear phishing

C.

Impersonation

D.

Identity fraud

Full Access
Question # 195

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

A.

Unidentified removable devices

B.

Default network device credentials

C.

Spear phishing emails

D.

Impersonation of business units through typosquatting

Full Access
Question # 196

A security administrator analyzes server logs and sees multiple lines of the following format:

SY0-601 question answer

The administrator is concerned about whether the request is valid. Which of the following attacks should the administrator evaluate?

A.

DLL injection

B.

XML injection

C.

SQL injection

D.

LDAP injection

Full Access
Question # 197

A prospective customer is interested in seeing the type of data that can be retrieved when a customer uses a company's services. An engineer at the company sends the following documentation before reviewing it:

SY0-601 question answer

The prospective customer is concerned Which of the following will best resoive the concern?

A.

Data sanitation

B.

Software updates

C.

Log aggregation

D.

CASB

Full Access
Question # 198

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks. SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

A.

Digital forensics

B.

E-discovery

C.

Incident response

D.

Threat hunting

Full Access
Question # 199

The cybersecurity investigation team is requesting a budget increase m order to purchase and implement a commercial tool for collecting information. The information might include disk images and volatile memory from computers used by remote employees Which of the following digital forensic categories does the company want to implement?

A.

Integrity

B.

E-discovery

C.

Acquisition

D.

Non-repudiation

Full Access
Question # 200

Which of the following would be used to find the most common web-applicalion vulnerabilities?

A.

OWASP

B.

MITRE ATT&CK

C.

Cyber Kill Chain

D.

SDLC

Full Access
Question # 201

A company is auditing the manner in which its European customers’ personal information is handled. Which of the following should the company consult?

A.

GDPR

B.

ISO

C.

NIST

D.

PCI DSS

Full Access
Question # 202

A security professional wants to enhance the protection of a critical environment that is Used to store and manage a company's encryption keys. The selected technology should be tamper resistant. Which of the following should the security professional implement to achieve the goal?

A.

DLP

B.

HSM

C.

CA

D.

FIM

Full Access
Question # 203

Law enforcement officials sent a company a notification that states electronically stored information and paper documents cannot be destroyed. Which of the following explains this process?

A.

Data breach notification

B.

Accountability

C.

Legal hold

D.

Chain of custody

Full Access
Question # 204

A security administrator needs to inspect in-transit files on the enterprise network to search for PI I credit card data, and classification words Which of the following would be the best to use?

A.

IDS solution

B.

EDR solution

C.

HIPS software solution

D.

Network DLP solution

Full Access
Question # 205

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization's vulnerabilities. Which of the following would best meet this need?

A.

CVE

B.

SIEM

C.

SOAR

D.

CVSS

Full Access
Question # 206

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned, one of the batch jobs failed and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

A.

Job rotation

B.

Retention

C.

Outsourcing

D.

Separation of duties

Full Access
Question # 207

Two organizations are discussing a possible merger Both Organizations Chief Fi-nancial Officers would like to safely share payroll data with each Other to de-termine if the pay scales for different roles are similar at both organizations Which Of the following techniques would be best to protect employee data while allowing the companies to successfully share this information?

A.

Pseudo-anonymization

B.

Tokenization

C.

Data masking

D.

Encryption

Full Access
Question # 208

A network administrator has been alerted that web pages are experiencing long load times After determining it is not a routing or DNS issue the administrator logs in to the router, runs a command, and receives the following output:

CPU 0 percent busy, from 300 sec ago

1 sec ave: 99 percent busy

5 sec ave: 97 percent busy

1 min ave: 83 percent busy

Which of the following is The router experiencing?

A.

DDoS attack

B.

Memory leak

C.

Buffer overflow

D.

Resource exhaustion

Full Access
Question # 209

A company wants to deploy decoy systems alongside production systems in order to entice threat actors and to learn more about attackers. Which of the follow r 3 best describes these systems?

A.

DNS sinkholes

B.

Honey pots

C.

Virtual machines

D.

Neural networks

Full Access
Question # 210

An organization routes all of its traffic through a VPN Most users are remote and connect into a corporate data center that houses confidential information There is a firewall at the internet border, followed by a DLP appliance, the VPN server and the data center itself Which of the following is the weakest design element?

A.

The DLP appliance should be integrated into a NGFW.

B.

Split-tunnel connections can negatively impact the DLP appliance's performance.

C.

Encrypted VPN traffic will not be inspected when entering or leaving the network.

D.

Adding two hops in the VPN tunnel may slow down remote connections

Full Access
Question # 211

A malicious actor recently penetrated a company's network and moved laterally to the data center Upon investigation a forensics firm wants to know what was in the memory on the compromised server Which of the following files should be given to the forensics firm?

A.

Security

B.

Application

C.

Dump

D.

Syslog

Full Access
Question # 212

A company is providing security awareness training regarding the importance of not forwarding social media messages from unverified sources. Which of the following risks would this training help to prevent?

A.

Hoaxes

B.

SPIMs

C.

Identity fraud

D.

Credential harvesting

Full Access
Question # 213

Users are reporting performance issues from a specific application server A security administrator notices that user traffic is being intermittently denied depending on which load balancer the traffic is originating from Which of the following types of log files should be used to capture this information?

A.

Session traffic

B.

Syslog data

C.

Security events

D.

DNS responses

E.

Authentication

Full Access
Question # 214

Which of the following would be the best way to block unknown programs from executing?

A.

Access control list

B.

Application allow list

C.

Host-based firewall

D.

DLP solution

Full Access
Question # 215

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

A.

Physical

B.

Managerial

C.

Detective

D.

Administrative

E.

Preventative

F.

Technical

Full Access
Question # 216

A security analyst is reviewing the following logs:

[10:00:00 AM] Login rejected - username administrator - password Spring2023

[10:00:01 AM] Login rejected - username jsmith - password Spring2023

[10:00:01 AM] Login rejected - username guest - password Spring2023

[10:00:02 AM] Login rejected - username cpolk - password Spring2023

[10:00:03 AM] Login rejected - username fmarbin - password Spring2023

Which of the following attacks is most likely occurring?

A.

Password spraying

B.

Account forgery

C.

Pass-the-hash

D.

Brute-force

Full Access
Question # 217

A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?

A.

IPS

B.

Firewall

C.

ACL

D.

Windows security

Full Access
Question # 218

A security administrator would like to protect data on employees' laptops. Which of the following encryption techniques should the security administrator use?

A.

Partition

B.

Asymmetric

C.

Full disk

D.

Database

Full Access
Question # 219

Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Select two).

A.

Tokenization

B.

CI/CD

C.

Honeypots

D.

Threat modeling

E.

DNS sinkhole

F.

Data obfuscation

Full Access
Question # 220

Which of the following best explains why physical security controls are important in creating a secure environment?

A.

To prevent external actors from obtaining sensitive data for social engineering attacks

B.

To allow different networks to work together without compromising the confidentiality of data

C.

To ensure only authorized users have the ability to obtain direct access to systems or data

D.

To reduce an attacker's ability to perform low-level or easier attacks against a network

Full Access
Question # 221

Which of the following threat actors is most likely to use a high level of sophistication and potentially zero-day exploits to target organizations and systems?

A.

APT groups

B.

Script kiddies

C.

Hacktivists

D.

Ethical hackers

Full Access
Question # 222

A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior. Which of the following would be best for the administrator to reference?

A.

MITRE ATT&CK

B.

CSIRT

C.

CVSS

D.

SOAR

Full Access
Question # 223

Which of the following is the most important security concern when using legacy systems to provide production service?

A.

Instability

B.

Lack of vendor support

C.

Loss of availability

D.

Use of insecure protocols

Full Access
Question # 224

Which of the following permits consistent automated deployment rather than manual provisioning of data centers?

A.

Transit gateway

B.

Private cloud

C.

Containerization

D.

Infrastructure as code

Full Access
Question # 225

Which of the following best describes a threat actor who is attempting to use commands found on a public code repository?

A.

Script kiddie

B.

State actor

C.

Insider threat

D.

Competitor espionage

Full Access
Question # 226

A security administrator is reviewing reports about suspicious network activity occurring on a subnet Users on the network report that connectivity to various websites is intermittent. The administrator logs in to a workstation and reviews the following command output:

SY0-601 question answer

Which of the following best describes what is occurring on the network?

A.

ARP poisoning

B.

On-path attack

C.

URL redirection

D.

IP address conflicts

Full Access
Question # 227

Which of the following best describes the action captured in this log file?

A.

Brute-force attack

B.

Privilege escalation

C.

Failed password audit

D.

Forgotten password by the user

Full Access
Question # 228

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?

A.

A thorough analysis of the supply chain

B.

A legally enforceable corporate acquisition policy

C.

A right to audit clause in vendor contracts and SOWs

D.

An in-depth penetration test of all suppliers and vendors

Full Access
Question # 229

Which of the following best describes why a process would require a two-person integrity security control?

A.

To increase the chance that the activity will be completed in half of the time the process would take only one user to

complete

B.

To permit two users from another department to observe the activity that is being performed by an authorized user

C.

To reduce the risk that the procedures are performed incorrectly or by an unauthorized user

D.

To allow one person to perform the activity while being recorded on the CCTV camera

Full Access
Question # 230

The Chief Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells the analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?

A.

Log in to the server and perform a health check on the VM.

B.

Install the patch immediately.

C.

Confirm that the backup service is running.

D.

Take a snapshot of the VM.

Full Access
Question # 231

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?

A.

Real-time recovery

B.

Hot

C.

Cold

D.

Warm

Full Access
Question # 232

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

A.

The device has been moved from a production environment to a test environment.

B.

The device is configured to use cleartext passwords.

C.

The device is moved to an isolated segment on the enterprise network.

D.

The device is moved to a different location in the enterprise.

E.

The device’s encryption level cannot meet organizational standards.

F.

The device is unable to receive authorized updates.

Full Access
Question # 233

The CIRT is reviewing an incident that involved a human resources recruiter exfiltrating sensitive company data. The CIRT found that the recruiter was able to use HTTP over port 53 to upload documents to a web server. Which of the following security infrastructure devices could have identified and blocked this activity?

A.

WAP utilizing SSL decryption

B.

NGFW utilizing application inspection

C.

UTM utilizing a threat feed

D.

SD-WAN utilizing IPSec

Full Access
Question # 234

A prospective customer is interested in seeing the type of data that can be retrieved when a customer uses a company's services. An engineer at the company sends the following documentation before reviewing it:

SY0-601 question answer

The prospective customer is concerned. Which of the following will best resolve the concern?

A.

Data sanitization

B.

Software updates

C.

Log aggregation

D.

CASB

Full Access
Question # 235

Which of the following is a security implication of newer 1CS devices that are becoming more common in corporations?

A.

Devices with celular communication capabilities bypass traditional network security controls

B.

Many devices do not support elliptic-curve encryption algorithms due to the overhead they require.

C.

These devices often lade privacy controls and do not meet newer compliance regulations

D.

Unauthorized voice and audio recording can cause loss of intellectual property

Full Access
Question # 236

A user is trying unsuccessfully to send images via SMS. The user downloaded the images from a corporate email account on a work phone. Which of the following policies is preventing the user from completing this action?

A.

Application management

B.

Content management

C.

Containerization

D.

Full disk encryption

Full Access
Question # 237

A company recently enhanced mobile device configuration by implementing a set of security controls: biometrics, context-aware authentication, and full device encryption. Even with these settings in place, an unattended phone was used by a malicious actor to access corporate data.

Which of the following additional controls should be put in place first?

A.

GPS tagging

B.

Remote wipe

C.

Screen lock timer

D.

SEAndroid

Full Access
Question # 238

A software developer used open-source libraries to streamline development. Which of the following is the greatest risk when using this approach?

A.

Unsecure root accounts

B.

Lack of vendor support

C.

Password complexity

D.

Default settings

Full Access
Question # 239

A security team discovered a large number of company-issued devices with non-work-related software installed. Which of the following policies would most likely contain language that would prohibit this activity?

A.

NDA

B.

BPA

C.

AUP

D.

SLA

Full Access
Question # 240

A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be best to help the organization's executives determine their next course of action?

A.

An incident response plan

B.

A communication plan

C.

A disaster recovery plan

D.

A business continuity plan

Full Access
Question # 241

Which of the following describes software on network hardware that needs to be updated on a rou-tine basis to help address possible vulnerabilities?

A.

Vendor management

B.

Application programming interface

C.

Vanishing

D.

Encryption strength

E.

Firmware

Full Access
Question # 242

A web server log contains two million lines. A security analyst wants to obtain the next 500 lines starting from line 4,600. Which of the following commands will help the security analyst to achieve this objective?

A.

cat webserver.log | head -4600 | tail +500 |

B.

cat webserver.log | tail -1995400 | tail -500 |

C.

cat webserver.log | tail -4600 | head -500 |

D.

cat webserver.log | head -5100 | tail -500 |

Full Access
Question # 243

Which of the following would satisfy three-factor authentication requirements?

A.

Password, PIN, and physical token

B.

PIN, fingerprint scan, and ins scan

C.

Password, fingerprint scan, and physical token

D.

PIN, physical token, and ID card

Full Access
Question # 244

A security operations center wants to implement a solution that can execute files to test for malicious activity. The solution should provide a report of the files' activity against known threats.

Which of the following should the security operations center implement?

A.

theHarvester

B.

Nessus

C.

Cuckoo

D.

Sn1per

Full Access
Question # 245

A security analyst received the following requirements for the deployment of a security camera solution:

* The cameras must be viewable by the on-site security guards.

+ The cameras must be able to communicate with the video storage server.

* The cameras must have the time synchronized automatically.

* The cameras must not be reachable directly via the internet.

* The servers for the cameras and video storage must be available for remote maintenance via the company VPN.

Which of the following should the security analyst recommend to securely meet the remote connectivity requirements?

A.

Creating firewall rules that prevent outgoing traffic from the subnet the servers and cameras reside on

B.

Deploying a jump server that is accessible via the internal network that can communicate with the servers

C.

Disabling all unused ports on the switch that the cameras are plugged into and enabling MAC filtering

D.

Implementing a WAF to allow traffic from the local NTP server to the camera server

Full Access
Question # 246

An analyst is working on an investigation with multiple alerts for multiple hosts. The hosts are showing signs of being compromised by a fast-spreading worm. Which of the following should be the next step in order to stop the spread?

A.

Disconnect every host from the network.

B.

Run an AV scan on the entire

C.

Scan the hosts that show signs of

D.

Place all known-infected hosts on an isolated network

Full Access
Question # 247

An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include:

* Check-in/checkout of credentials

* The ability to use but not know the password

* Automated password changes

* Logging of access to credentials

Which of the following solutions would meet the requirements?

A.

OAuth 2.0

B.

Secure Enclave

C.

A privileged access management system

D.

An OpenID Connect authentication system

Full Access
Question # 248

A company has hired an assessment team to test the security of the corporate network and employee vigilance. Only the Chief Executive Officer and Chief Operating Officer are aware of this exercise, and very little information has been provided to the assessors. Which of the following is taking place?

A.

A red-team test

B.

A white-team test

C.

A purple-team test

D.

A blue-team test

Full Access
Question # 249

A new security engineer has started hardening systems. One o( the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability lo use SCP to transfer files to the NAS, even though the data is still viewable from the users' PCs. Which of the following is the MOST likely cause of this issue?

A.

TFTP was disabled on the local hosts.

B.

SSH was turned off instead of modifying the configuration file.

C.

Remote login was disabled in the networkd.conf instead of using the sshd. conf.

D.

Network services are no longer running on the NAS

Full Access
Question # 250

A security analyst is assisting a team of developers with best practices for coding. The security analyst would like to defend against the use of SQL injection attacks. Which of the following should the security analyst recommend first?

A.

Tokenization

B.

Input validation

C.

Code signing

D.

Secure cookies

Full Access
Question # 251

Given the following snippet of Python code:

SY0-601 question answerWhich of the following types of malware MOST likely contains this snippet?

A.

Logic bomb

B.

Keylogger

C.

Backdoor

D.

Ransomware

Full Access
Question # 252

Which of the following incident response phases should the proper collection of the detected 'ocs and establishment of a chain of custody be performed before?

A.

Containment

B.

Identification

C.

Preparation

D.

Recovery

Full Access
Question # 253

A Chief Information Security Officer (CISO) is evaluating the dangers involved in deploying a new ERP system for the company. The CISO categorizes the system, selects the controls that apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system. Which of the following is the CISO using to evaluate the environment for this new ERP system?

A.

The Diamond Model of Intrusion Analysis

B.

CIS Critical Security Controls

C.

NIST Risk Management Framework

D.

ISO 27002

Full Access
Question # 254

A retail store has a business requirement to deploy a kiosk computer In an open area The kiosk computer's operating system has been hardened and tested. A security engineer IS concerned that

someone could use removable media to install a rootkit Mich of the should the security engineer configure to BEST protect the kiosk computer?

A.

Measured boot

B.

Boot attestation

C.

UEFI

D.

EDR

Full Access
Question # 255

A company is switching to a remote work model for all employees. All company and employee resources will be in the cloud. Employees must use their personal computers to access the cloud computing environment. The company will manage the operating system. Which of the following deployment models is the company implementing?

A.

CYOD

B.

MDM

C.

COPE

D.

VDI

Full Access
Question # 256

Which of the following should customers who are involved with Ul developer agreements be concerned with when considering the use of these products on highly sensitive projects?

A.

Weak configurations

B.

Integration activities

C.

Unsecure user accounts

D.

Outsourced code development

Full Access
Question # 257

A network security manager wants to implement periodic events that will test the security team's preparedness for incidents in a controlled and scripted manner, Which of the following concepts describes this scenario?

A.

Red-team exercise

B.

Business continuity plan testing

C.

Tabletop exercise

D.

Functional exercise

Full Access
Question # 258

Which of the following measures the average time that equipment will operate before it breaks?

A.

SLE

B.

MTBF

C.

RTO

D.

ARO

Full Access
Question # 259

A security administrator is managing administrative access to sensitive systems with the following requirements:

• Common login accounts must not be used for administrative duties.

• Administrative accounts must be temporal in nature.

• Each administrative account must be assigned to one specific user.

• Accounts must have complex passwords.

" Audit trails and logging must be enabled on all systems.

Which of the following solutions should the administrator deploy to meet these requirements? (Give Explanation and References from CompTIA Security+ SY0-601 Official Text Book and Resources)

A.

ABAC

B.

SAML

C.

PAM

D.

CASB

Full Access
Question # 260

The alert indicates an attacker entered thousands of characters into the text box of a web form. The web form was intended for legitimate customers to enter their phone numbers. Which of the attacks has most likely occurred?

A.

Privilege escalation

B.

Buffer overflow

C.

Resource exhaustion

D.

Cross-site scripting

Full Access
Question # 261

A security team is providing input on the design of a secondary data center that has the following requirements:+ Anatural disaster at the primary site should not affect the secondary site. The secondary site should have the capability for failover during traffic surge situations.+ The secondary site must meet the same physical security requirements as the primary site. The secondary site must provide protection against power surges and outages.

Which of the following should the security team recommend? (Select two).

A.

 Coniguring replication of the web servers at the primary site to offline storage

B.

 Constructing the secondary site in a geographically disperse location

C.

 Deploying load balancers at the primary site

D.

 Installing generators

E.

 Using differential backups at the secondary site

F.

 Implementing hot and cold aisles at the secondary site

Full Access
Question # 262

Security engineers are working on digital certificate management with the top priority of making administration easier. Which of the following certificates is the best option?

A.

User

B.

Wildcard

C.

Self-signed

D.

Root

Full Access
Question # 263

A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.

SY0-601 question answer

INSTRUCTIONS

Click on each firewall to do the following:

1. Deny cleartext web traffic

2. Ensure secure management protocols are used.

3. Resolve issues at the DR site.

The ruleset order cannot be modified due to outside constraints.

Hat any time you would like to bring back the initial state of the simulation, please dick the Reset All button.

SY0-601 question answer

SY0-601 question answer

SY0-601 question answer

Full Access
Question # 264

A company owns a public-facing e-commerce website. The company outsources credit card transactions to a payment company. Which of the following BEST describes the role of the payment company?

A.

Data controller

B.

Data custodian

C.

Data owners

D.

Data processor

Full Access
Question # 265

A company policy requires third-party suppliers to self-report data breaches within a specific time frame. Which of the following third-party risk management policies is the company complying with?

A.

MOU

B.

SLA

C.

EOL

D.

NDA

Full Access
Question # 266

A user's laptop constantly disconnects from the Wi-Fi network. Once the laptop reconnects, the user can reach the internet but cannot access shared folders or other network resources. Which of the following types of attacks is the user MOST likely experiencing?

A.

Bluejacking

B.

Jamming

C.

Rogue access point

D.

Evil twin

Full Access
Question # 267

A security administrator is using UDP port 514 to send a syslog through an unsecure network to the SIEM server. Which of the following is the best way for the administrator to improve the process?

A.

Change the protocol to TCP.

B.

Add LDAP authentication to the SIEM server.

C.

Use a VPN from the internal server to the SIEM and enable DLP.

D.

Add SSL/TLS encryption and use a TCP 6514 port to send logs.

Full Access
Question # 268

Which of the following can be used to calculate the total loss expected per year due to a threat targeting an asset?

A.

EF x asset value

B.

ALE / SLE

C.

MTBF x impact

D.

SLE x ARO

Full Access
Question # 269

An employee's laptop was stolen last month. This morning, the was returned by the A cyberrsecurity analyst retrieved laptop and has since cybersecurity incident checklist Four incident handlers are responsible for executing the checklist. Which of the following best describes the process for evidence collection assurance?

A.

Time stamp

B.

Chain of custody

C.

Admissibility

D.

Legal hold

Full Access
Question # 270

A systems integrator is installing a new access control system for a building. The new system will need to connect to the Company's AD server In order to validate current employees. Which of the following should the systems integrator configure to be the most secure?

A.

HTTPS

B.

SSH

C.

SFTP

D.

LDAPS

Full Access
Question # 271

An organization recently completed a security control assessment The organization determined some controls did not meet the existing security measures. Additional mitigations are needed to lessen the risk of the non-complaint controls. Which of the following best describes these

mitigations?

A.

Corrective

B.

Compensating

C.

Deterrent

D.

Technical

Full Access
Question # 272

A junior human resources administrator was gathering data about employees to submit to a new company awards program The employee data included job title business phone number location first initial with last name and race Which of the following best describes this type of information?

A.

Sensitive

B.

Non-Pll

C.

Private

D.

Confidential

Full Access
Question # 273

A cybersecurity analyst at Company A is working to establish a secure communication channel with a counter part at Company B, which is 3,000 miles (4.828 kilometers) away. Which of the following concepts would help the analyst meet this goal m a secure manner?

A.

Digital signatures

B.

Key exchange

C.

Salting

D.

PPTP

Full Access
Question # 274

Which of the following processes would most likely help an organization that has conducted an incident response exercise to improve performance and identify challenges?

A.

Lessons learned

B.

Identification

C.

Simulation

D.

Containment

Full Access
Question # 275

A security administrator is compiling information from all devices on the local network in order to gain better visibility into user activities. Which of the following is the best solution to meet

this objective?

A.

SIEM

B.

HIDS

C.

CASB

D.

EDR

Full Access
Question # 276

Which of the following can be used to detect a hacker who is stealing company data over port 80?

A.

Web application scan

B.

Threat intelligence

C.

Log aggregation

D.

Packet capture

Full Access
Question # 277

Multiple beaconing activities to a malicious domain have been observed. The malicious domain is hosting malware from various endpoints on the network. Which of the following

technologies would be best to correlate the activities between the different endpoints?

A.

Firewall

B.

SIEM

C.

IPS

D.

Protocol analyzer

Full Access
Question # 278

An organization has been experiencing outages during holiday sales and needs to ensure availability of its point-of-sales systems. The IT administrator has been asked to improve both server-data fault tolerance and site availability under high consumer load. Which of the following are the best options to accomplish this objective? (Select two.)

A.

Load balancing

B.

Incremental backups

C.

UPS

D.

RAID

E.

Dual power supply

F.

VLAN

Full Access
Question # 279

A company wants to enable BYOD for checking email and reviewing documents. Many of the documents contain sensitive organizational information. Which of the following should be deployed first before allowing the use of personal devices to access company data?

A.

MDM

B.

RFID

C.

DLR

D.

SIEM

Full Access
Question # 280

Which Of the following security controls can be used to prevent multiple from using a unique card swipe and being admitted to a entrance?

A.

Visitor logs

B.

Faraday cages

C.

Access control vestibules

D.

Motion detection sensors

Full Access
Question # 281

A company recently implemented a patch management policy; however, vulnerability scanners have still been flagging several hosts, even after the completion of the patch process. Which of the following is the most likely cause of the issue?

A.

The vendor firmware lacks support.

B.

Zero-day vulnerabilities are being discovered.

C.

Third-party applications are not being patched.

D.

Code development is being outsourced.

Full Access
Question # 282

A systems engineer thinks a business system has been compromised and is being used to exfiltrated data to a competitor The engineer contacts the CSIRT The CSIRT tells the engineer to immediately disconnect the network cable and to not do anything else Which of the following is the most likely reason for this request?

A.

The CSIRT thinks an insider threat is attacking the network

B.

Outages of business-critical systems cost too much money

C.

The CSIRT does not consider the systems engineer to be trustworthy

D.

Memory contents including fileles malware are lost when the power is turned off

Full Access
Question # 283

Which of the following would a security analyst use to determine if other companies in the same sector have seen similar malicious activity against their systems?

A.

Vulnerability scanner

B.

Open-source intelligence

C.

Packet capture

D.

Threat feeds

Full Access
Question # 284

An upcoming project focuses on secure communications and trust between external parties. Which of the following security components will need to be considered to ensure a chosen trust provider IS

used and the selected option is highly scalable?

A.

Self-signed certificate

B.

Certificate attributes

C.

Public key Infrastructure

D.

Domain validation

Full Access
Question # 285

Audit logs indicate an administrative account that belongs to a security engineer has been locked out multiple times during the day. The security engineer has been on vacation (or a few days. Which of the following attacks can the account lockout be attributed to?

A.

Backdoor

B.

Brute-force

C.

Rootkit

D.

Trojan

Full Access
Question # 286

A security engineer is concerned the strategy for detection on endpoints is too heavily dependent on previously defined attacks. The engineer wants a tool that can monitor for changes to key files and network traffic for the device. Which of the following tools should the engineer select?

A.

HIDS

B.

AV

C.

NGF-W

D.

DLP

Full Access
Question # 287

A company is launching a website in a different country in order to capture user information that a marketing business can use. The company itself will not be using the information. Which

of the following roles is the company assuming?

A.

Data owner

B.

Data processor

C.

Data steward

D.

Data collector

Full Access
Question # 288

An organization wants to quickly assess how effectively the IT team hardened new laptops Which of the following would be the best solution to perform this assessment?

A.

Install a SIEM tool and properly configure it to read the OS configuration files.

B.

Load current baselines into the existing vulnerability scanner.

C.

Maintain a risk register with each security control marked as compliant or non-compliant.

D.

Manually review the secure configuration guide checklists.

Full Access
Question # 289

A user is trying to upload a tax document, which the corporate finance department requested, but a security program IS prohibiting the upload A security analyst determines the file contains Pll, Which of

the following steps can the analyst take to correct this issue?

A.

Create a URL filter with an exception for the destination website.

B.

Add a firewall rule to the outbound proxy to allow file uploads

C.

Issue a new device certificate to the user's workstation.

D.

Modify the exception list on the DLP to allow the upload

Full Access
Question # 290

Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?

A.

DLP

B.

TLS

C.

AV

D.

IDS

Full Access
Question # 291

A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

A.

MAC filtering

B.

Anti-malware

C.

Translation gateway

D.

VPN

Full Access
Question # 292

A major manufacturing company updated its internal infrastructure and just started to allow OAuth application to access corporate data Data leakage is being reported Which of following most likely caused the issue?

A.

Privilege creep

B.

Unmodified default

C.

TLS

D.

Improper patch management

Full Access
Question # 293

A company recently upgraded its authentication infrastructure and now has more computing power. Which of the following should the company consider using to ensure user credentials are

being transmitted and stored more securely?

A.

Blockchain

B.

Salting

C.

Quantum

D.

Digital signature

Full Access
Question # 294

A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the company’s mobile application. After reviewing the back-end server logs, the security analyst finds the following entries:

SY0-601 question answer

Which of the following is the most likely cause of the security control bypass?

A.

IP address allow list

B.

User-agent spoofing

C.

WAF bypass

D.

Referrer manipulation

Full Access
Question # 295

A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident The systems administrator has just informed investigators that other log files are available for review Which of the following did the administrator most likely configure that will assist the investigators?

A.

Memory dumps

B.

The syslog server

C.

The application logs

D.

The log retention policy

Full Access
Question # 296

An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding credit card statement with unusual purchases. Which of the following attacks took place?

A.

On-path attack

B.

Protocol poisoning

C.

Domain hijacking

D.

Bluejacking

Full Access
Question # 297

Which of the following would provide guidelines on how to label new network devices as part of the initial configuration?

A.

IP schema

B.

Application baseline configuration

C.

Standard naming convention policy

D.

Wireless LAN and network perimeter diagram

Full Access
Question # 298

A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

A.

Off-the-shelf software

B.

Orchestration

C.

Baseline

D.

Policy enforcement

Full Access
Question # 299

An employee finds a USB flash drive labeled "Salary Info" in an office parking lot. The employee picks up the USB flash drive, goes into the office, and plugs it into a laptop. Later, a technician inspects the laptop and realizes it has been compromised by malware. Which of the following types of social engineering attacks has occurred?

A.

Smishing

B.

Baiting

C.

Tailgating

D.

Pretexting

Full Access
Question # 300

An organization decided not to put controls in place because of the high cost of implementing the controls compared to the cost of a potential fine. Which of the following risk management strategies is the organization following?

A.

Transference

B.

Avoidance

C.

Mitigation

D.

Acceptance

Full Access
Question # 301

Which of the following considerations is the most important for an organization to evaluate as it establishes and maintains a data privacy program?

A.

Reporting structure for the data privacy officer

B.

Data subject access request process

C.

Role as controller and processor

D.

Physical location of the company

Full Access
Question # 302

Which of the following best describes a tool used by an organization to identi-fy, log, and track any potential risks and corresponding risk information?

A.

Quantitative risk assessment

B.

Risk register

C.

Risk control assessment

D.

Risk matrix

Full Access
Question # 303

A large bank with two geographically dispersed data centers Is concerned about major power disruptions at Both locations. Every day each location experiences very brief outages thai last (or a few seconds. However, during the summer a high risk of intentional under-voltage events that could last up to an hour exists, particularly at one of the locations near an industrial smelter. Which of the following is the BEST solution to reduce the risk of data loss?

A.

Dual supply

B.

Generator

C.

PDU

D.

Dally backups

Full Access
Question # 304

A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into clicking the following:

SY0-601 question answer

Which of the following was most likely observed?

A.

DLL injection

B.

Session replay

C.

SQLi

D.

xss

Full Access
Question # 305

Which of the following does an air-gapped system provide?

A.

Security through physical disconnection

B.

Security through obscurity

C.

Users with mobility

D.

Security through logical isolation

Full Access
Question # 306

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

A.

Insider threat

B.

Hacktivist

C.

Nation-state

D.

Organized crime

Full Access
Question # 307

Which of the following types of data are most likely to be subject to regulations and laws? (Select two).

A.

PHI

B.

Trade secrets

C.

Proprietary

D.

OSINT

E.

Pll

F.

Public

Full Access
Question # 308

Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?

A.

Phone call

B.

Instant message

C.

Email

D.

Text message

Full Access
Question # 309

A security administrator recently reset local passwords and the following values were recorded in the system:

SY0-601 question answer

Which of the following is the security administrator most likely protecting against?

A.

Account sharing

B.

Weak password complexity

C.

Pass-the-hash attacks

D.

Password compromise

Full Access
Question # 310

A external forensics investigator has been hired to investigate a data breach at a large enterprise with numerous assets. It is known that the breach started in the perimeter network and moved to the sensitive information, generating multiple logs as the attacker traversed through the network. Which of the following will best assist with this investigation?

A.

Perform a vulnerability scan to identify the weak spots.

B.

Use a packet analyzer to investigate the NetFlow traffic.

C.

Check the SIEM to review the correlated logs.

D.

Require access to the routers to view current sessions

Full Access
Question # 311

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicioud provider

environment. The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control

and management regardless of the data location. Which of the following would best meet the architect's objectives?

A.

Trusted Platform Module

B.

laaS

C.

HSMaas

D.

PaaS

Full Access
Question # 312

Which of the following is the correct order of volatility from most to least volatile?

A.

Memory, temporary filesystems. routing tables, disk, network storage

B.

Cache, memory, temporary filesystems. disk, archival media

C.

Memory, disk, temporary filesystems. cache, archival media

D.

Cache, disk, temporary filesystems. network storage, archival media

Full Access
Question # 313

A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?

A.

Cross-site scripting

B.

Buffer overflow

C.

Jailbreaking

D.

Side loading

Full Access
Question # 314

An organization is concerned that its hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?

A.

hping3 -S comptia.org -p 80

B.

nc -1 -v comptia.org -p 80

C.

nmap comptia.org -p 80 -sV

D.

nslookup -port=80 comptia.org

Full Access
Question # 315

An organization is concerned about intellectual property theft by employees who leave the organization Which of the following should the organization most likely implement?

A.

CBT

B.

NDA

C.

MOU

D.

AUP

Full Access
Question # 316

A security engineer must deploy two wireless routers in an office suite Other tenants in the office building should not be able to connect to this wireless network Which of the following protocols should the engineer implement to ensure the strongest encryption?

A.

WPS

B.

WPA2

C.

WAP

D.

HTTPS

Full Access
Question # 317

Which of the following would be best suited for constantly changing environments?

A.

RTOS

B.

Containers

C.

Embedded systems

D.

SCADA

Full Access
Question # 318

An organization is building backup server rooms in geographically diverse locations. The Chief Information Secure implemented a requirement on the project that states the new hardware cannot be susceptible to the same vulned existing server room. Which of the following should the systems engineer consider?

A.

Purchasing hardware from different vendors

B.

Migrating workloads to public cloud infrastructure

C.

Implementing a robust patch management solution

D.

Designing new detective security controls

Full Access