Download CompTIA Security+ Exam.BrainDumpsStore.SY0-601.2021-04-30.1e.213q.vcex


Download Exam

File Info

Exam CompTIA Security+ Certification Exam
Number SY0-601
File Name CompTIA Security+ Exam.BrainDumpsStore.SY0-601.2021-04-30.1e.213q.vcex
Size 3.63 Mb
Posted April 30, 2021
Downloads 3



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
INSTRUCTIONS
Click on each firewall to do the following:
Deny cleartext web traffic.
Ensure secure management protocols are used.
Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
  
  
  
  


  • A: See the explanation



Question 2
A security engineer is setting up passwordless authentication for the first time.
INSTRUCTIONS
Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




Question 3
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




Question 4
Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with humanmanagement interfaces that are accessible over the Internet via a web interface? (Choose two.)

  • A: Cross-site scripting
  • B: Data exfiltration
  • C: Poor system logging
  • D: Weak encryption
  • E: SQL injection
  • F: Server-side request forgery



Question 5
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?

  • A: Containerization
  • B: Geofencing
  • C: Full-disk encryption
  • D: Remote wipe



Question 6
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks.
Which of the following would BEST meet the CSO's objectives?

  • A: Use email-filtering software and centralized account management, patch high-risk systems, andrestrict administration privileges on fileshares.
  • B: Purchase cyber insurance from a reputable provider to reduce expenses during an incident.
  • C: Invest in end-user awareness training to change the long-term culture and behavior of staff andexecutives, reducing the organization's susceptibility to phishing attacks.
  • D: Implement application whitelisting and centralized event-log management, and perform regulartesting and validation of full backups.



Question 7
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to determine the issue? (Choose two.)

  • A: Perform a site survey
  • B: Deploy an FTK Imager
  • C: Create a heat map
  • D: Scan for rogue access points
  • E: Upgrade the security protocols
  • F: Install a captive portal



Question 8
A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?

  • A: dd
  • B: chmod
  • C: dnsenum
  • D: logger



Question 9
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

  • A: SSAE SOC 2
  • B: PCI DSS
  • C: GDPR
  • D: ISO 31000



Question 10
Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff.
Which of the following would MOST likely help mitigate this issue?

  • A: DNSSEC and DMARC
  • B: DNS query logging
  • C: Exact mail exchanger records in the DNS
  • D: The addition of DNS conditional forwarders








ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset