New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-601 Exam Dumps - CompTIA Security+ Exam 2023

Go to page:
Question # 137

While reviewing the /etc/shadow file, a security administrator notices files with the same values. Which of the following attacks should the administrator be concerned about?

A.

Plaintext

B.

Birthdat

C.

Brute-force

D.

Rainbow table

Full Access
Question # 138

Which of the following secure application development concepts aims to block verbose error messages from being shown in a user’s interface?

A.

OWASP

B.

Obfuscation/camouflage

C.

Test environment

D.

Prevent of information exposure

Full Access
Question # 139

A user is trying to upload a tax document, which the corporate finance department requested, but a security program IS prohibiting the upload A security analyst determines the file contains Pll, Which of

the following steps can the analyst take to correct this issue?

A.

Create a URL filter with an exception for the destination website.

B.

Add a firewall rule to the outbound proxy to allow file uploads

C.

Issue a new device certificate to the user's workstation.

D.

Modify the exception list on the DLP to allow the upload

Full Access
Question # 140

A security analyst is reviewing computer logs because a host was compromised by malware After the computer was infected it displayed an error screen and shut down. Which of the following should the analyst review first to determine more information?

A.

Dump file

B.

System log

C.

Web application log

D.

Security too

Full Access
Question # 141

An organization is repairing the damage after an incident. Which of the following controls is being implemented?

A.

Detective

B.

Preventive

C.

Corrective

D.

Compensating

Full Access
Question # 142

Which of the following types of controls is a turnstile?

A.

Physical

B.

Detective

C.

Corrective

D.

Technical

Full Access
Question # 143

A user enters a password to log in to a workstation and is then prompted to enter an authentication code Which of the following MFA factors or attributes are being utilized in the authentication process? {Select two).

A.

Something you know

B.

Something you have

C.

Somewhere you are

D.

Someone you know

E.

Something you are

F.

Something you can do

Full Access
Question # 144

Which of the following roles is responsible for defining the protection type and Classification type for a given set of files?

A.

General counsel

B.

Data owner

C.

Risk manager

D.

Chief Information Officer

Full Access
Go to page: