Exam Logo

Comptia (SY0-601) Exam Questions And Answers page 17

A security assessment determines DES and 3DES are still being used on recently deployed production servers. Which of the following did the assessment identify?
Threats, Attacks, and Vulnerabilities Technologies and Tools
A security administrator is analyzing the corporate wireless network. The network only has two access points running on channels 1 and 11. While using airodump-ng. the administrator notices other access points are running with the same corporate ESSID on all available channels and with the same BSSID of one of the legitimate access points. Which of the following attacks is happening on the corporate network?
Threats, Attacks, and Vulnerabilities Architecture and Design
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company s data?
Technologies and Tools Risk Management
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?
Threats, Attacks, and Vulnerabilities Risk Management
A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company s network. The company s lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst discovers the following:


Which of the following attacks MOST likely occurred?
Threats, Attacks, and Vulnerabilities Identity and Access Management
An organization has decided to host its web application and database in the cloud. Which of the following BEST describes the security concerns for this decision?
Threats, Attacks, and Vulnerabilities Architecture and Design
A small company that does not have security staff wants to improve its security posture. Which of the following would BEST assist the company?
Technologies and Tools Risk Management
A web server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the administrator implement to avoid disruption?
Technologies and Tools Architecture and Design
Users at an organization have been installing programs from the Internet on their workstations without first receiving proper authorization. The organization maintains a portal from which users can install standardized programs. However, some users have administrative access on their workstations to enable legacy programs to function properly. Which of the following should the security administrator consider implementing to address this issue?
Threats, Attacks, and Vulnerabilities Identity and Access Management
The website http://companywebsite.com requires users to provide personal information, including security question responses, for registration. Which of the following would MOST likely cause a data breach?
Threats, Attacks, and Vulnerabilities