Exam Logo

Comptia (SY0-601) Exam Questions And Answers page 29

A security analyst is reviewing logs on a server and observes the following output:


Which of the following is the security analyst observing?
Threats, Attacks, and Vulnerabilities Identity and Access Management
A security operations analyst is using the company s SIEM solution to correlate alerts. Which of the following stages of the incident response process is this an example of?
Threats, Attacks, and Vulnerabilities Technologies and Tools
A security analyst is reviewing the following command-line output:


Which of the following is the analyst observing?
Threats, Attacks, and Vulnerabilities Identity and Access Management
A security analyst needs to complete an assessment. The analyst is logged into a server and must use native tools to map services running on it to the server s listening ports. Which of the following tools can BEST accomplish this task?
Technologies and Tools Architecture and Design
The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve security in the environment and protect patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have not been provided to frontline staff, and a risk analysis has not been performed. Which of the following is the MOST likely cause of the CRO s concerns?
Identity and Access Management Risk Management
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better:
Threats, Attacks, and Vulnerabilities Identity and Access Management
In which of the following situations would it be BEST to use a detective control type for mitigation?
Threats, Attacks, and Vulnerabilities Risk Management
A security analyst needs to perform periodic vulnerability scans on production systems. Which of the following scan types would produce the BEST vulnerability scan report?
Threats, Attacks, and Vulnerabilities
An analyst needs to set up a method for securely transferring files between systems. One of the requirements is to authenticate the IP header and the payload. Which of the following services would BEST meet the criteria?
Technologies and Tools Cryptography and PKI
A cybersecurity analyst needs to implement secure authentication to third-party websites without users passwords. Which of the following would be the BEST way to achieve this objective?
Architecture and Design Identity and Access Management