100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTIA SY0-601 Exam Actual Questions (190 questions with 100% correct answers) $17.99   Add to cart

Exam (elaborations)

CompTIA SY0-601 Exam Actual Questions (190 questions with 100% correct answers)

 8 views  0 purchase
  • Course
  • CompTIA SY0-601
  • Institution
  • CompTIA SY0-601

CompTIA SY0-601 Exam Actual Questions (190 questions with 100% correct answers)/CompTIA SY0-601 Exam Actual Questions (190 questions with 100% correct answers)/CompTIA SY0-601 Exam Actual Questions (190 questions with 100% correct answers)

Preview 4 out of 58  pages

  • October 22, 2024
  • 58
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CompTIA SY0-601
  • CompTIA SY0-601
avatar-seller
atiexpert
CompTIA SY0-601 Exam Actual
Questions
A user is attempting to navigate to a website from inside the company network using a desktop.
When the user types in the URL, https://www.site.com, the user is presented with a certificate
mismatch warning from the browser. The user does not receive a warning when visiting
http://www.anothersite.com. Which of the following describes this attack?
A. On-path
B. Domain hijacking
C. DNS poisoning
D. Evil twin - correct answer B


Which of the following tools is effective in preventing a user from accessing unauthorized
removable media?
A. USB data blocker
B. Faraday cage
C. Proximity reader
D. Cable lock - correct answer A


A Chief Security Officer is looking for a solution that can provide increased scalability and
flexibility for back-end infrastructure, allowing it to be updated and modified without disruption
to services. The security architect would like the solution selected to reduce the back-end
server resources and has highlighted that session persistence is not important for the
applications running on the back-end servers. Which of the following would BEST meet the
requirements?
A. Reverse proxy
B. Automated patch management
C. Snapshots
D. NIC teaming - correct answer C


Which of the following describes a social engineering technique that seeks to exploit a person's
sense of urgency?

,CompTIA SY0-601 Exam Actual
Questions
A. A phishing email stating a cash settlement has been awarded but will expire soon
B. A smishing message stating a package is scheduled for pickup
C. A vishing call that requests a donation be made to a local charity
D. A SPIM notification claiming to be undercover law enforcement investigating a cybercrime -
correct answer C


A security analyst is reviewing application logs to determine the source of a breach and locates
the following log: https://www.comptia.com/login.php?id='%20or%20'1'1='1Which of the
following has been observed?
A. DLL Injection
B. API attack
C. SQLi
D. XSS - correct answer C


An audit identified PII being utilized in the development environment of a critical application.
The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the
developers are concerned that without real data they cannot perform functionality tests and
search for specific data. Which of the following should a security professional implement to
BEST satisfy both the CPO's and the development team's requirements?
A. Data anonymization
B. Data encryption
C. Data masking
D. Data tokenization - correct answer A


A company is implementing a DLP solution on the file server. The file server has PII, financial
information, and health information stored on it. Depending on what type of data that is hosted
on the file server, the company wants different DLP rules assigned to the data. Which of the
following should the company do to help accomplish this goal?
A. Classify the data.

,CompTIA SY0-601 Exam Actual
Questions
B. Mask the data.
C. Assign the application owner.
D. Perform a risk analysis. - correct answer A


A forensics investigator is examining a number of unauthorized payments that were reported
on the company's website. Some unusual log entries show users received an email for an
unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users
reported the email to the phishing team, and the forwarded email revealed the link to be:<a
href="https://www.company.com/payto.do?routing=00001111&acct=22223334&amount=250
">Click here to unsubscribe</a>Which of the following will the forensics investigator MOST
likely determine has occurred?
A. SQL injection
B. Broken authentication
C. XSS
D. XSRF - correct answer B


A report delivered to the Chief Information Security Officer (CISO) shows that some user
credentials could be exfiltrated. The report also indicates that users tend to choose the same
credentials on different systems and applications. Which of the following policies should the
CISO use to prevent someone from using the exfiltrated credentials?
A. MFA
B. Lockout
C. Time-based logins
D. Password history - correct answer A


A company wants to simplify the certificate management process. The company has a single
domain with several dozen subdomains, all of which are publicly accessible on the internet.
Which of the following BEST describes the type of certificate the company should implement?
A. Subject alternative name

, CompTIA SY0-601 Exam Actual
Questions
B. Wildcard
C. Self-signed
D. Domain validation - correct answer B


Which of the following is an effective tool to stop or prevent the exfiltration of data from a
network?
A. DLP
B. NIDS
C. TPM
D. FDE - correct answer A


Several attempts have been made to pick the door lock of a secure facility. As a result, the
security engineer has been assigned to implement a stronger preventative access control.
Which of the following would BEST complete the engineer's assignment?
A. Replacing the traditional key with an RFID key
B. Installing and monitoring a camera facing the door
C. Setting motion-sensing lights to illuminate the door on activity
D. Surrounding the property with fencing and gates - correct answer A


Which of the following can be used by a monitoring tool to compare values and detect
password leaks without providing the actual credentials?
A. Hashing
B. Tokenization
C. Masking
D. Encryption - correct answer A

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller atiexpert. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart