Comptia (SY0-601) Exam Questions And Answers page 6
The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls. Which of the following BEST represents this type of threat?
Shadow IT
Hacktivism
White-hat
Threats, Attacks, and Vulnerabilities
A small retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things:
• Protection from power outages
• Always-available connectivity in case of an outage
The owner has decided to implement battery backups for the computer equipment. Which of the following would BEST fulfill the owner s second need?
• Protection from power outages
• Always-available connectivity in case of an outage
The owner has decided to implement battery backups for the computer equipment. Which of the following would BEST fulfill the owner s second need?
Lease a point-to-point circuit to provide dedicated access.
Connect the business router to its own dedicated UPS.
Purchase services from a cloud provider for high availability.
Replace the business s wired network with a wireless network.
Technologies and Tools
Risk Management
When planning to build a virtual environment, an administrator needs to achieve the following:
• Establish policies to limit who can create new VMs.
• Allocate resources according to actual utilization.
• Require justification for requests outside of the standard requirements.
• Create standardized categories based on size and resource requirements.
Which of the following is the administrator MOST likely trying to do?
• Establish policies to limit who can create new VMs.
• Allocate resources according to actual utilization.
• Require justification for requests outside of the standard requirements.
• Create standardized categories based on size and resource requirements.
Which of the following is the administrator MOST likely trying to do?
Implement IaaS replication
Protect against VM escape
Deploy a PaaS
Avoid VM sprawl
Threats, Attacks, and Vulnerabilities
Identity and Access Management
A network administrator has been asked to design a solution to improve a company s security posture. The administrator is given the following requirements:
• The solution must be inline in the network.
• The solution must be able to block known malicious traffic.
• The solution must be able to stop network-based attacks.
Which of the following should the network administrator implement to BEST meet these requirements?
• The solution must be inline in the network.
• The solution must be able to block known malicious traffic.
• The solution must be able to stop network-based attacks.
Which of the following should the network administrator implement to BEST meet these requirements?
HIDS
NIDS
HIPS
NIPS
Threats, Attacks, and Vulnerabilities
Technologies and Tools
An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?
The theft of portable electronic devices
Geotagging in the metadata of images
Bluesnarfing of mobile devices
Data exfiltration over a mobile hotspot
Threats, Attacks, and Vulnerabilities
Identity and Access Management
A security analyst is running a vulnerability scan to check for missing patches during a suspected security incident. During which of the following phases of the response process is this activity MOST likely occurring?
Containment
Identification
Recovery
Preparation
Threats, Attacks, and Vulnerabilities
Architecture and Design
A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?
A new firewall rule is needed to access the application
The system was quarantined for missing software updates
The software was not added to the application whitelist
The system was isolated from the network due to infected software
Threats, Attacks, and Vulnerabilities
Technologies and Tools
A security administrator currently spends a large amount of time on common security tasks, such as report generation, phishing investigations, and user provisioning and deprovisioning. This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members. Which of the following should the administrator attempt?
DAC
ABAC
SCAP
SOAR
Technologies and Tools
Identity and Access Management
An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance s vulnerable state?
The system was configured with weak default security settings.
The device uses weak encryption ciphers.
The vendor has not supplied a patch for the appliance.
The appliance requires administrative credentials for the assessment.
Threats, Attacks, and Vulnerabilities
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicate a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
http://sample.url.com/someotherpageonsite/../../../etc/shadow
http://sample.url.com/select-from-database-where-password-null
http://redirect.sameple.url.sampleurl.com/malicious-dns-redirect
http://sample.url.com/<script>Please-Visit-Our-Phishing-Site</script>
Threats, Attacks, and Vulnerabilities
Comments