New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-601 Exam Dumps - CompTIA Security+ Exam 2023

Go to page:
Question # 233

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks. SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

A.

Digital forensics

B.

E-discovery

C.

Incident response

D.

Threat hunting

Full Access
Question # 234

• Sensitive customer data must be safeguarded.

• Documents from managed sources should not be opened in unmanaged destinations.

• Sharing of managed documents must be disabled.

• Employees should not be able to download emailed images to their devices.

• Personal photos and contact lists must be kept private.

• IT must be able to remove data from lost/stolen devices or when an employee no longer works for the company.

Which of the following are the best features to enable to meet these requirements? (Select two).

A.

Remote wipe

B.

VPN connection

C.

Biometric authentication

D.

Device location tracking

E.

Geofencing

F.

Application approve list

G.

Containerization

Full Access
Question # 235

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done first?

A.

Configure heat maps.

B.

Utilize captive portals.

C.

Conduct a site survey.

D.

Install Wi-Fi analyzers.

Full Access
Question # 236

Which of the following agreement types defines the time frame in which a vendor needs to respond?

A.

SOW

B.

SLA

C.

MOA

D.

MOU

Full Access
Question # 237

A systems administrator set up a perimeter firewall but continues to notice suspicious connections between internal endpoints. Which of the following should be set up in order to mitigate the threat posed by the suspicious activity?

A.

Host-based firewall

B.

Web application firewall

C.

Access control list

D.

Application allow list

Full Access
Question # 238

A security analyst is working with a vendor to get a new SaaS application deployed to an enterprise. The analyst wants to ensure role-based security policies are correctly applied as users access the application. Which of the following is most likely to solve the issue?

A.

CASB

B.

AUP

C.

NG-SWG

D.

VPC endpoint

Full Access
Question # 239

Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resumes?

A.

SLA

B.

MOU

C.

MOA

D.

BPA

Full Access
Question # 240

Which of the following is best used to detect fraud by assigning employees to different roles?

A.

Least privilege

B.

Mandatory vacation

C.

Separation of duties

D.

Job rotation

Full Access
Go to page: