New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-601 Exam Dumps - CompTIA Security+ Exam 2023

Go to page:
Question # 57

A company has numerous employees who store PHI data locally on devices. The Chief Information Officer wants to implement a solution to reduce external exposure of PHI but not affect the business.

The first step the IT team should perform is to deploy a DLP solution:

A.

for only data in transit.

B.

for only data at reset.

C.

in blocking mode.

D.

in monitoring mode.

Full Access
Question # 58

A security administrator examines the ARP table of an access switch and sees the following output:

Which of the following is a potential threat that is occurring on this access switch?

A.

DDoSonFa02 port

B.

MAG flooding on Fa0/2 port

C.

ARP poisoning on Fa0/1 port

D.

DNS poisoning on port Fa0/1

Full Access
Question # 59

A software developer used open-source libraries to streamline development. Which of the following is the greatest risk when using this approach?

A.

Unsecure root accounts

B.

Lack of vendor support

C.

Password complexity

D.

Default settings

Full Access
Question # 60

Which of the following procedures would be performed after the root cause of a security incident has been identified to help avoid future incidents from occurring?

A.

Walk-throughs

B.

Lessons learned

C.

Attack framework alignment

D.

Containment

Full Access
Question # 61

A company completed a vulnerability scan. The scan found malware on several systems that were running older versions of Windows. Which of the following is MOST likely the cause of the malware infection?

A.

Open permissions

B.

Improper or weak patch management

C.

Unsecure root accounts

D.

Default settings

Full Access
Question # 62

Which of the following would provide guidelines on how to label new network devices as part of the initial configuration?

A.

IP schema

B.

Application baseline configuration

C.

Standard naming convention policy

D.

Wireless LAN and network perimeter diagram

Full Access
Question # 63

Which of the following describes business units that purchase and implement scripting software without approval from an organization's technology Support staff?

A.

Shadow IT

B.

Hacktivist

C.

Insider threat

D.

script kiddie

Full Access
Question # 64

An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include:

* Check-in/checkout of credentials

* The ability to use but not know the password

* Automated password changes

* Logging of access to credentials

Which of the following solutions would meet the requirements?

A.

OAuth 2.0

B.

Secure Enclave

C.

A privileged access management system

D.

An OpenID Connect authentication system

Full Access
Go to page: