Exam Logo

Comptia (SY0-601) Exam Questions And Answers page 6

The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls. Which of the following BEST represents this type of threat?
Threats, Attacks, and Vulnerabilities
A small retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things:

• Protection from power outages
• Always-available connectivity in case of an outage

The owner has decided to implement battery backups for the computer equipment. Which of the following would BEST fulfill the owner s second need?
Technologies and Tools Risk Management
When planning to build a virtual environment, an administrator needs to achieve the following:

• Establish policies to limit who can create new VMs.
• Allocate resources according to actual utilization.
• Require justification for requests outside of the standard requirements.
• Create standardized categories based on size and resource requirements.

Which of the following is the administrator MOST likely trying to do?
Threats, Attacks, and Vulnerabilities Identity and Access Management
A network administrator has been asked to design a solution to improve a company s security posture. The administrator is given the following requirements:

• The solution must be inline in the network.
• The solution must be able to block known malicious traffic.
• The solution must be able to stop network-based attacks.

Which of the following should the network administrator implement to BEST meet these requirements?
Threats, Attacks, and Vulnerabilities Technologies and Tools
An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?
Threats, Attacks, and Vulnerabilities Identity and Access Management
A security analyst is running a vulnerability scan to check for missing patches during a suspected security incident. During which of the following phases of the response process is this activity MOST likely occurring?
Threats, Attacks, and Vulnerabilities Architecture and Design
A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?
Threats, Attacks, and Vulnerabilities Technologies and Tools
A security administrator currently spends a large amount of time on common security tasks, such as report generation, phishing investigations, and user provisioning and deprovisioning. This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members. Which of the following should the administrator attempt?
Technologies and Tools Identity and Access Management
An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance s vulnerable state?
Threats, Attacks, and Vulnerabilities
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicate a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
Threats, Attacks, and Vulnerabilities