CompTIA SECURITY+ SY0-601 EXAM Questions and Answers(Verified)
1
1 / 53
CompTIA SECURITY+ SY0-601 EXAM 2023 - 2024
Questions and Answers(Verified)
1. A security administrator suspects an employee has been emailing propri- etary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk.
Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger ANS : A
2. DRAG AND DROP SIMULATION (SEE IMAGE): THIS IS THE ORDER
AS FOLLOWS:
ssh-keygen -t rsa
ssh-copy-id -i ~/.ssh/id_rsa.pub
user@server chmod 644 ~/.ssh/id_rsa
ssh root@server
2
2 / 53
3. DROP DOWN SIMULATION (SEE IMAGE) ANS : Firewall 1:DNS Rule ""
ANY --> ANY --> DNS --> PERMIT
HTTPS Outbound "" 10.0.0.1/24 --> ANY --> HTTPS --> PERMIT
Management "" ANY --> ANY --> SSH --> PERMIT
HTTPS Inbound "" ANY --> ANY --> HTTPS --> PERMIT
HTTP Inbound "" ANY --> ANY --> HTTP --> DENY
Firewall 2: No changes should be made to this firewall
Firewall 3:DNS Rule "" ANY --> ANY --> DNS --> PERMIT
HTTPS Outbound "" 192.168.0.1/24 --> ANY --> HTTPS --> PERMIT
Management "" ANY --> ANY --> SSH --> PERMIT
HTTPS Inbound "" ANY --> ANY --> HTTPS --> PERMIT
HTTP Inbound "" ANY --> ANY --> HTTP --> DENY
4. DRAG AND DROP SIMULATION (SEE ANSWERS IN IMAGE): See
3
5. Which of the following will MOST likely adversely impact the operations
of unpatched traditional programmable-logic controllers, running a backend LAMP server and OT systems with human-management interfaces that
are accessible over the Internet via a web interface? (Choose two.)
A. Cross-site scripting
B. Data exfiltration
C. Poor system logging
D.Weak encryption
E. SQL injection
F. Server-side request forgery ANS : DF
6. A company recently transitioned to a strictly BYOD culture due to the
cost of replacing lost or damaged corporate-owned mobile devices.
Which of the following technologies would be BEST to balance the
BYOD culture while also protecting the company's data?
A. Containerization
B. Geofencing
C. Full-disk encryption
D. Remote wipe ANS : A
4
7. A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime
and enhance organizational resilience to ransomware attacks.
Which of the following would BEST meet the CSO's objectives?
A. Use email-filtering software and centralized account management,
patch high-risk systems, and restrict administration privileges on
fileshares.
B. Purchase cyber insurance from a reputable provider to reduce
expenses during an incident.
C. Invest in end-user awareness training to change the long-term culture
and behavior of staff and executives, reducing the organization's
susceptibility to phishing attacks.
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |