1 / 11

CompTIA Security Exam 2021 SY0-601 Real Questions

PassQuestion provides high quality CompTIA Security Exam 2021 SY0-601 Real Questions which cover all the questions that you will face in the Exam Center. It covers the latest pattern and topics that are used in Real Test.

Download Presentation

CompTIA Security Exam 2021 SY0-601 Real Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SY0-601 Free Questions SY0-601 Free Questions CompTIA Security+ Exam 2021 CompTIA Security+ Exam 2021 https://www.passquestion.com/ https://www.passquestion.com/SY0-601 SY0-601.html .html

  2. Question 1 Question 1 The SOC is reviewing process and procedures after a recent incident. The review indicates The SOC is reviewing process and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best it took more than 30 minutes to determine that quarantining an infected host was the best course of action. The allowed the malware to spread to additional hosts before it was course of action. The allowed the malware to spread to additional hosts before it was contained. contained. Which of the following would be BEST to improve the incident response process? Which of the following would be BEST to improve the incident response process? A. Updating the playbooks with better decision points A. Updating the playbooks with better decision points B. Dividing the network into trusted and untrusted zones B. Dividing the network into trusted and untrusted zones C. Providing additional end-user training on acceptable use C. Providing additional end-user training on acceptable use D. Implementing manual quarantining of infected hosts D. Implementing manual quarantining of infected hosts Answer: A Answer: A

  3. Question 2 Question 2 Which of the following would be BEST to establish between organizations that have Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement? party, but do not want to establish a contractually binding agreement? A. An SLA A. An SLA B. AnNDA B. AnNDA C. ABPA C. ABPA D. AnMOU D. AnMOU Answer: D Answer: D

  4. Question 3 Question 3 Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue? Which of the following would MOST likely help mitigate this issue? A. DNSSEC and DMARC A. DNSSEC and DMARC B. DNS query logging B. DNS query logging C. Exact mail exchanger records in the DNS C. Exact mail exchanger records in the DNS D. The addition of DNS conditional forwarders D. The addition of DNS conditional forwarders Answer: C Answer: C

  5. Question 4 Question 4 Which of the following control sets should a well-written BCP include? (Select THREE) Which of the following control sets should a well-written BCP include? (Select THREE) A. Preventive A. Preventive B. Detective B. Detective C. Deterrent C. Deterrent D. Corrective D. Corrective E. Compensating E. Compensating F. Physical F. Physical G. Recovery G. Recovery Answer: A,D,G Answer: A,D,G

  6. Question 5 Question 5 A security engineer needs to Implement the following requirements: A security engineer needs to Implement the following requirements: • All Layer 2 switches should leverage Active Directory tor authentication. • All Layer 2 switches should leverage Active Directory tor authentication. • All Layer 2 switches should use local fallback authentication If Active Directory Is offline. • All Layer 2 switches should use local fallback authentication If Active Directory Is offline. • All Layer 2 switches are not the same and are manufactured by several vendors. • All Layer 2 switches are not the same and are manufactured by several vendors. Which of the following actions should the engineer take to meet these requirements? (Select TWO). Which of the following actions should the engineer take to meet these requirements? (Select TWO). A. Implement RADIUS. A. Implement RADIUS. B. Configure AAA on the switch with local login as secondary. B. Configure AAA on the switch with local login as secondary. C. Configure port security on the switch with the secondary login method. C. Configure port security on the switch with the secondary login method. D. Implement TACACS+ D. Implement TACACS+ E. Enable the local firewall on the Active Directory server. E. Enable the local firewall on the Active Directory server. F. Implement a DHCP server. F. Implement a DHCP server. Answer: A,B Answer: A,B

  7. Question 6 Question 6 A company wants to deploy PKI on its Internet-facing website. A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are: The applications that are currently deployed are: ✑ ✑ www.company.com (main website) www.company.com (main website) ✑ ✑ contactus.company.com (for locating a nearby location) contactus.company.com (for locating a nearby location) ✑ ✑ quotes.company.com (for requesting a price quote) quotes.company.com (for requesting a price quote) The company wants to purchase one SSL certificate that will work for all the existing applications and The company wants to purchase one SSL certificate that will work for all the existing applications and any future applications that follow the same naming conventions, such as store.company.com. any future applications that follow the same naming conventions, such as store.company.com. Which of the following certificate types would BEST meet the requirements? Which of the following certificate types would BEST meet the requirements? A. SAN A. SAN B. Wildcard B. Wildcard C. Extended validation C. Extended validation D. Self-signed D. Self-signed Answer: B Answer: B

  8. Question 7 Question 7 A security engineer needs to enhance MFA access to sensitive areas in a building. A security engineer needs to enhance MFA access to sensitive areas in a building. A key card and fingerprint scan are already in use. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication? Which of the following would add another factor of authentication? A. Hard token A. Hard token B. Retina scan B. Retina scan C. SMS text C. SMS text D. Keypad PIN D. Keypad PIN Answer: B Answer: B

  9. Question 8 Question 8 A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing? Which of the following describes what the manager is doing? A. Developing an incident response plan A. Developing an incident response plan B. Building a disaster recovery plan B. Building a disaster recovery plan C. Conducting a tabletop exercise C. Conducting a tabletop exercise D. Running a simulation exercise D. Running a simulation exercise Answer: C Answer: C

  10. Question 9 Question 9 Entering a secure area requires passing through two doors, both of which require someone who is Entering a secure area requires passing through two doors, both of which require someone who is already inside to initiate access. already inside to initiate access. Which of the following types of physical security controls does this describe? Which of the following types of physical security controls does this describe? A. Cameras A. Cameras B. Faraday cage B. Faraday cage C. Access control vestibule C. Access control vestibule D. Sensors D. Sensors E. Guards E. Guards Answer: C Answer: C

  11. Question 10 Question 10 A company recently moved sensitive videos between on-premises. Company-owned websites. The A company recently moved sensitive videos between on-premises. Company-owned websites. The company then learned the videos had been uploaded and shared to the internet. company then learned the videos had been uploaded and shared to the internet. Which of the following would MOST likely allow the company to find the cause? Which of the following would MOST likely allow the company to find the cause? A. Checksums A. Checksums B. Watermarks B. Watermarks C. Oder of volatility C. Oder of volatility D. A log analysis D. A log analysis E. A right-to-audit clause E. A right-to-audit clause Answer: D Answer: D

More Related