CompTIA SY0-601 Quiz Flashcards
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the companyג€™s data?
Containerization
A Chief Security Office’s (CSO’s) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO’s objectives?
Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups.
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to determine the issue? (Choose two.)
Perform a site survey
Create a heat map
A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employeeג€™s hard disk. Which of the following should the administrator use?
dd for disk duplicator
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
The data processor is a General Data Protection regulation
(GDPR) role that uses and manipulates data on behalf of the data controller.
HTTPS uses port
443
DNS uses port
53
SNMP uses port
161
SSH uses port
22
You received an email from an online store stating that they are giving away iPhones at a 70% discount in
the clearance sale. The email also stated that everyone is rushing to buy these iPhones, and only a limited stock is available. The email contained a link that you had to click to register yourself.
Which type of social engineering principle is being used here?
Scarcity
You suspect that one of the systems on the network is infected with malware. Even after scanning the
system with updated antimalware, you are not able to locate anything. The system, however, continues to
show malware symptoms. Which type of malware can be present on this system?
Fileless
Which type of wireless attack requires a disassociation attack as a pre-requisite?
An evil twin is a WAP that has the same name as the legitimate WAP. The attacker
first dissociates the clients from the legitimate WAP using the disassociation attack. The clients then
connect to the evil twin.
You have joined an organization as a software development team leader. You want your team to adopt secure coding techniques. Which of the following should you use?
In this scenario, you should use the OWASP secure coding guidelines. The OWASP
guidelines should be integrated into the development
You are performing dynamic code analysis on a Web application. Which of the following tasks are you likely to be performing while the application is running?
Verifying the environmental configuration is part of the dynamic code analysis.
You want to extend your organization’s security policies to the cloud environment. Which of the following should you use?
CASB, Cloud Access Security Broker, extends the security policies of an organization to the cloud implementation. They are responsible for extending the security between the users and the cloud service providers.
You want to gather information about several emails from a domain. You also want to list the sub domains for the domain that you specify. Which tool should you use?
the Harvester
Cuckoo is an
an open-source sandbox for malware analysis
Nessus is a
a vulnerability management tool
Sniper is an
an information gathering and penetration testing platform
the Harvester is an
open-source tool specializing in gathering information, such as emails, employee information, sub-domains, and hostnames. It can use a variety of search engines, such as Google and Bing, and other platforms, such as LinkedIn
You want to refer to the knowledge base of adversary tactics and techniques and learn about their attack methods. Which of the following should you refer to in this scenario?
use MITRE ATT&CK, the knowledge base of adversary tactics and techniques collected from real-world scenarios. You can use this to learn about specific methods of an attacker.
A system is used as a tool in cybercrime. You need to ensure that you capture the digital evidence without fail. Keeping the Order of volatility in mind, which of the following should you focus on first to maintain the Order of volatility?
As per the Order of volatility, this is the first thing you need to capture. You need to get the information from the cache and registers.
You have several security policies to make part of the Information Security Management System (ISMS). Which of the following framework should you use?
you should opt for the ISO 27001 framework that helps you establish an ISMS. It provides guidelines as to how the policies should be written and applied. It helps the organizations put practices in place that help them safeguard the information.
You are suspecting a financial fraud that has taken place. You want to ensure that you can detect it.
Which of the following method should you use?
Mandatory vacations are enforced to detect any kind of illegitimate or wrong practices followed by the employees. You can audit the financial data after the required people are
sent on vacation.
You have been tasked to add a disclaimer to the email that is received from external domains. Which of the following methods should you use?
Prepending is the method of adding a disclaimer or information text to the emails received from external domains.
A vishing attack allows an attacker to
use a fake caller ID to conduct a phishing
attack. In this attack, the attacker attempts to get sensitive information from the call recipient.
Smishing is a
phishing attack that is conducted by sending an SMS with a malicious link.
Whaling is a
type of social engineering attack that targets high-profiled individuals in an organization.
Which of the following attack can an attacker conduct to circumvent an account lockout by trying the passwords?
Password spraying attack
You want to conduct a DNS poisoning attack. Which of the following tools should you use?
It can conduct various attacks, such as DNS poisoning and ARP poisoning. In the
DNS poisoning attack, the attacker changes the IP address in DNS records and redirects the users to its website. In this scenario, from the given choices, you need to use the Ettercap tool
You are the security administrator for your organization. You have to ensure that all systems are compliant with a specific baseline. During a security audit, which of the following should you prove that the systems are compliant against the baseline?
A benchmark is about comparing the system with a specific standard, which is the baseline. You need to use the benchmark to measure the compliance of these systems.
Instead of upgrading the existing Customer Relationship Management (CRM) application, the
management of your organization has decided to go with a cloud version CRM to save cost on
implementation and maintenance. Which type of cloud delivery model would you be using in this
scenario?
you would be using the SaaS cloud delivery model, which allows you to use a cloud-hosted application. This reduces cost because you don’t have to purchase the application and can work with subscriptions
IaaS is
Infrastructure As A Service, which allows you to set up an entire network or datacenter in the cloud. In this scenario, you have only to use an application.
PaaS is
Platform As A Service, which allows you to develop and maintain applications in the cloud. In this scenario, you have only to use an application.