100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTIA Security+ SY0-601 Practice Questions CA$11.53   Add to cart

Exam (elaborations)

CompTIA Security+ SY0-601 Practice Questions

 3 views  0 purchase

CompTIA Security+ SY0-601 Practice Questions

Preview 3 out of 16  pages

  • July 12, 2024
  • 16
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (7)
avatar-seller
lydiaomutho
CompTIA Security+ SY0-601 Practice Questions.
-78% average error rate
-Spike in API calls - ANS-A cloud service provider (CSP) dashboard provides a view of all
applicable logs for cloud resources and services. When examining the application programming
interface (API) logs, the cloud engineer sees some odd metrics. Which of the following are
examples that the engineer would have concerns for? (Select all that apply.)

-A pass-the-hash attack
-A replay attack - ANS-A security engineer implemented once-only tokens and timestamping
sessions. What type of attacks can this type of security prevent? (Select all that apply.)

-A rainbow table
-A dictionary word - ANS-An attacker can exploit a weakness in a password protocol to calculate
the hash of a password. Which of the following can the attacker match the hash to, as a means
to obtain the password? (Select all that apply.)

-A solution that is known as zone-redundant storage.
-Access is available if a single data center is destroyed. - ANS-An organization moves its data
to the cloud. Engineers utilize regional replication to protect data. Review the descriptions and
conclude which ones apply to this configuration. (Select all that apply.)

-An online CA is needed in order to publish a CRL.
-An online root is required to add an intermediate CA. - ANS-A company has a two-level
certificate authority (CA) hierarchy. One of the CA servers is offline, while the others are online.
Which statements are TRUE of online and offline CAs? (Select all that apply.)

-Blackhole
-Physical disconnection/air gapping
-Sandboxing - ANS-Select the methods of containment based on the concept of isolation.

-Block TCP ports
-Allow network protocols - ANS-A network administrator set up a basic packet filtering firewall
using an open-source application running on a Linux virtual machine. The immediate benefit to
this deployment is the quick configuration of basic firewall rules. Which of the following reasons
may have also influenced the administrator's decision to deploy a stateless, rather than a
stateful, firewall? (Select all that apply.)

-Computer Bots,
-Command & Control - ANS-An attacker is planning to set up a backdoor that will infect a set of
specific computers at an organization, to inflict a set of other intrusion attacks remotely. Which of
the following will support the attackers' plan? (Select all that apply.)

,-Domain reputation
-URL redirections - ANS-External hackers have some access to a company's website and made
some changes. Customers have submitted multiple complaints via email for wrong orders and
inappropriate images on the website. The Chief Information Officer (CIO) is now worried about
the distribution of malware. The company should prepare for which of the following other issues
or concerns? (Select all that apply.)

-Establish a guest zone
-Upload files using SSH
-Use configuration templates - ANS-Consider the principles of web server hardening and
determine which actions a system administrator should take when deploying a new web server
in a demilitarized zone (DMZ).

-hpingterm-129
-Nmap - ANS-A penetration tester is testing a network's vulnerability. The first test to perform is
to test how well the network's firewall responds to a flood-based Denial of Service (DoS) attack.
What software tools can perform both packet sniffing and a DoS attack? (Select all that apply.)

-HTTP Strict Transport Security (HSTS)
-Content Security Policy (CSP)
-Cache-Control - ANS-A web administrator notices a few security vulnerabilities that need to be
addressed on the company Intranet site. The portal must force a secure browsing connection,
mitigate script injection, and prevent caching on shared client devices. Determine the secure
options to set on the web server's response headers. (Select all that apply.)

-Key discovery
-Improper error handling - ANS-The latest web application, using default settings, is currently
accepting application programming interface (API) calls over HyperText Transfer Protocol
(HTTP). The environment has a moderate key management system. Even with basic server
security, the API connection is vulnerable to which of the following? (Select all that apply.)

-Launch a Distributed Denial of Service (DDoS) attack
-Establish a connection with a Command and Control server
-Launch a mass-mail spam attack - ANS-If a user's computer becomes infected with a botnet,
which of the following can this compromise allow the attacker to do? (Select all that apply.)

-Locate the offending radio source and disable it.
-Boost the signal of the legitimate equipment. - ANS-An attacker used an illegal access point
(AP) with a very strong signal near a wireless network. If the attacker performed a jamming
attack, which of the following would mitigate this type of network disruption? (Select all that
apply.)

-Message authentication

, -Block source routed packets - ANS-A company is renovating a new office space and is
updating all Cisco routers. The up-to-date Internetwork Operating System (IOS) will provide the
best protection from zero-day exploits. What other options could a network administrator
configure for route security? (Select all that apply.)

-nmap xxx.xxx.x.x -O
-nmap xxx.xxx.x.x -A - ANS-A penetration tester is experimenting with Nmap on a test network.
The tester would like to know the operating system of the target device. Select all Nmap
commands that will provide the tester with OS information. (Select all that apply.)

-Prevent malicious traffic between VMs
-Protection from zero day attacks - ANS-A small organization operates several virtual servers in
a single host environment. The physical network utilizes a physical firewall with NIDS for
security. What would be the benefits of installing a Host Intrusion Prevention System (HIPS) at
the end points? (Select all that apply.)

-Query strings to identify incident types
-When to report compliance incidents
-Incident categories and definitions - ANS-A resident cybersecurity expert is putting together a
playbook. Evaluate the elements that the security expert should include in the playbook. (Select
all that apply.)

-Regional replication
-High availability - ANS-Cloud service providers make services available around the world
through a variety of methods. The concept of a zone assumes what type of service level?
(Select all that apply.)

-Reputation damage
-Fines
-Identity theft - ANS-Which of the following can be consequences of a data breach? (Select all
that apply.)

-Resource exhaustion
-Denial of service (DoS)
-Amplification - ANS-Which of the following conditions are results of a SYN (synchronize) flood
attack? (Select all that apply.)

-Set up efficient east-west traffic.
-Set up zero trust. - ANS-Cloud engineers are considering network segmentation options that
will provide the most security between services on the cloud platform. Which of the following
would ensure this type of network security is within the cloud? (Select all that apply.)

-Sinkhole

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller lydiaomutho. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$11.53. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$11.53
  • (0)
  Add to cart