Exam Logo

Comptia (SY0-601) Exam Questions And Answers page 27

A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message:


Which of the following network attacks is the researcher MOST likely experiencing?
Threats, Attacks, and Vulnerabilities Technologies and Tools
A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device?
Threats, Attacks, and Vulnerabilities Technologies and Tools
Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
Architecture and Design Risk Management
SIMULATION

A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802.1X using the most secure encryption and protocol available.

INSTRUCTIONS

Perform the following steps:
1. Configure the RADIUS server.
2. Configure the WiFi controller.
3. Preconfigure the client for an incoming guest. The guest AD credentials are:
User: guest01
Password: guestpass

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Technologies and Tools Identity and Access Management
Which of the following is a team of people dedicated to testing the effectiveness of organizational security programs by emulating the techniques of potential attackers?
Threats, Attacks, and Vulnerabilities Technologies and Tools
A company is concerned about its security after a red-team exercise. The report shows the team was able to reach the critical servers due to the SMB being exposed to the Internet and running NTLMv1. Which of the following BEST explains the findings?
Threats, Attacks, and Vulnerabilities Identity and Access Management
A company is designing the layout of a new datacenter so it will have an optimal environmental temperature. Which of the following must be included? (Choose two.)
Architecture and Design Identity and Access Management
A user must introduce a password and a USB key to authenticate against a secure computer, and authentication is limited to the state in which the company resides. Which of the following authentication concepts are in use?
Threats, Attacks, and Vulnerabilities Identity and Access Management
A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output:


Which of the following steps would be best for the security engineer to take NEXT?
Threats, Attacks, and Vulnerabilities Technologies and Tools
An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?
Threats, Attacks, and Vulnerabilities Identity and Access Management