Topics

Tirada pre examen En el documento

https://medium.com/@boscowjohn128/top-original-comptia-sy0-701-exam-questions-authentic-comptia-dumps-top-tips-2024-4cb3757cdddc

  1. F
  2. V

| https://www.examtopics.com/discussions/comptia/view/78386-exam-sy0-601-topic-1-question-1-discussion/ | | —- | | A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL, https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?

- A. On-path
- B. Domain hijacking
- ==C. DNS poisoning==
- D. Evil twin | | The scenario described aligns more closely with DNS poisoning. In DNS poisoning, an attacker corrupts or falsifies the data stored in DNS caches, leading to users being redirected to incorrect or malicious IP addresses when attempting to access certain domains. In this case, the user is experiencing issues with accessing a specific website due to a certificate mismatch warning, which could indicate that the DNS resolution for that website has been tampered with, potentially through DNS poisoning. Domain hijacking involves illegally taking control of a registered domain, which typically wouldn’t directly result in certificate mismatch warnings but rather in unauthorized control over the domain’s resources. |

  1. V
  2. F
https://www.examtopics.com/discussions/comptia/view/78466-exam-sy0-601-topic-1-question-3-discussion/
A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements?

- ==A. Reverse proxy==
- B. Automated patch management
- C. Snapshots
- D. NIC teaming

Given the requirements provided, the solution that would best meet the needs of increased scalability and flexibility for back-end infrastructure, while reducing server resources and allowing updates without disrupting services, would be:

A. Reverse proxy

A reverse proxy can efficiently distribute incoming client requests across multiple back-end servers, allowing for scalability and flexibility. It can also handle updates and modifications to the back-end servers without disrupting services, as it can route traffic away from servers undergoing maintenance. Additionally, a reverse proxy can reduce the load on back-end servers by caching and serving static content, thus conserving server resources. Since session persistence is not important for the applications running on the back-end servers, a reverse proxy can manage requests without requiring session affinity.
 
 
  1. V
  2. V
  3. V
  4. V
  5. V
  6. F

| A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfiltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfiltrated credentials?

- ==A. MFA==
- B. Lockout
- C. Time-based logins
- D. Password history | | —- | | The policy that would be most effective in preventing someone from successfully using exfiltrated credentials is:

A. MFA (Multi-Factor Authentication).

MFA adds an additional layer of security by requiring users to provide multiple forms of identification before gaining access to an account or system. Even if an attacker manages to obtain a user’s credentials, they would still need to provide an additional form of authentication, such as a temporary code sent to the user’s phone or generated by an authenticator app. This significantly reduces the likelihood of unauthorized access, even with compromised credentials. | | | | |

  1. V
  2. V
  3. V
  4. V
  5. F

| A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?

- A. S/MIME
- B. LDAPS
==- C. SSH==
- D. SRTP | | —- | | Answer: SSH - SSH or (Secure Shell) is a protocol that enables two computers to communicate securely by encrypting the connection. Since the question is looking to transfer files over the internet to a specific directory, the FTP protocol can be used for the file transfer itself. As SSH can be used with the FTP protocol, this allows for secure(SSH) file transfer(FTP) over the internet. |

  1. V
  2. V
  3. V
  4. F

| A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures. The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?

- A. HIPS
- B. FIM
==- C. TPM==
- D. DLP | | —- | | In this question, an attack has already occurred so preventative measures such as HIPS, FIM, or DLP would not be helpful. Also, the analyst wants to check the integrity of the system, and boot attestation can take place. TPM chips have mechanisms to prevent system tampering and boot attestation can be done with TPM based hardware to verify the state of the firmware, bootloader, etc. TPM is the best option here. |

  1. V
  2. V
  3. V
  4. V
  5. F ¿? ###==Victor aiuda==

| Which of the following are common VoIP-associated vulnerabilities? (Choose two.)

- A. SPIM
==- B. Vishing==
- C. Hopping
- D. Phishing
- E. Credential harvesting
- F. Tailgating | | —- | | https://www.examtopics.com/exams/comptia/sy0-601/view/3/ |

  1. V
  2. V
  3. F ¿? ¿? ###**==Victor aiuda

| A security engineer is deploying a new wireless network for a company. The company shares office space with multiple tenants. Which of the following should the engineer configure on the wireless network to ensure that confidential data is not exposed to unauthorized users??

- A. EAP
- B. TLS
- C. HTTPS
- D. AES | | —- | | https://www.examtopics.com/exams/comptia/sy0-601/view/3/ |

  1. F

| The Chief Compliance Officer from a bank has approved a background check policy for all new hires. Which of the following is the policy MOST likely protecting against?

- A. Preventing any current employees’ siblings from working at the bank to prevent nepotism
==- B. Hiring an employee who has been convicted of theft to adhere to industry compliance==
- C. Filtering applicants who have added false information to resumes so they appear better qualified
- D. Ensuring no new hires have worked at other banks that may be trying to steal customer information | | —- | | Background checks are commonly used by organizations, particularly in industries like banking, to screen potential hires for criminal history, including convictions related to theft or financial crimes. This helps ensure compliance with industry regulations and standards and reduces the risk of hiring individuals who may pose a threat to the security of the bank’s assets or customer information. |

  1. F ###**==Victor aiuda

| An engineer recently deployed a group of 100 web servers in a cloud environment. Per the security policy, all web-server ports except 443 should be disabled.
Which of the following can be used to accomplish this task?

- A. Application allow list
- B. SWG
- C. Host-based firewall
- D. VPN | | —- | | |

  1. F F ###**==Victor aiuda

| A technician was dispatched to complete repairs on a server in a data center. While locating the server, the technician entered a restricted area without authorization. Which of the following security controls would BEST prevent this in the future?

- A. Use appropriate signage to mark all areas.
- B. Utilize cameras monitored by guards.
==- C. Implement access control vestibules.==
- D. Enforce escorts to monitor all visitors.

Reveal Solution | | | — | — | | Access control vestibules are physical security measures that require individuals to pass through multiple controlled checkpoints to gain access to restricted areas. By implementing access control vestibules in the data center, the technician would need to pass through authorized entry points, which may include badge readers, biometric scanners, or security personnel checkpoints, before reaching the server area. This would help prevent unauthorized entry and ensure that only individuals with proper authorization can access the restricted areas. | |

  1. V (en exam topics mal)
  2. V (en exam topics mal)
  3. https://www.examtopics.com/exams/comptia/sy0-601/view/4/#
  4. v
  5. v
  6. [[Concepts#^2f7f76 Ref]] ¿?¿?¿?¿? https://www.examtopics.com/discussions/comptia/view/78512-exam-sy0-601-topic-1-question-35-discussion/
  7. v
  8. hoax concetps
  9. v
  10. f // . High data entropy will increase cryptographic security
  11. v
  12. V
  13. V
  14. V
  15. -

| Which of the following is the BEST example of a cost-effective physical control to enforce a USB removable media restriction policy?

- A. Putting security/antitamper tape over USB ports, logging the port numbers, and regularly inspecting the ports
- B. Implementing a GPO that will restrict access to authorized USB removable media and regularly verifying that it is enforced
- C. Placing systems into locked, key-controlled containers with no access to the USB ports
- D. Installing an endpoint agent to detect connectivity of USB and removable media | | —- | | A. Putting security/antitamper tape over USB ports, logging the port numbers, and regularly inspecting the ports.

This method is a low-cost solution that physically prevents access to USB ports by placing tape over them, which deters unauthorized use. Additionally, logging the port numbers and regularly inspecting the ports allows for monitoring and detection of any tampering attempts. It’s a straightforward approach that doesn’t require significant investment in hardware or software, making it cost-effective. |

  1. V
  2. V
  3. V
  4. V
  5. V
  6. V
  7. NIST Nist
  8. V
  9. V
  10. REVIW [[Concepts#^4f87d3 Command & Control]]
  11. V
  12. REVIEW
  13. REVIEW
  14. V
  15. V // REVIEW
  16. REVIEW //

### Tirada pre examen

  1. V
  2. V
  3. V
  4. V
  5. V
  6. V
  7. V
  8. V
  9. v
  10. f pki
  11. v
  12. v
  13. f NG
  14. V
  15. V
  16. V
  17. V
  18. V
  19. V
  20. V
  21. V
  22. f Password History
  23. v
  24. v
  25. v
  26. v
  27. f Memory Leak
  28. v
  29. v
  30. f DUDA
  31. v
  32. v
  33. v
  34. v
  35. v
  36. v
  37. v
  38. v
  39. v
  40. f Transit Gateway
  41. V
  42. f Digital sig
  43. v
  44. v SOC2
  45. v
  46. v
  47. v
  48. v
  49. v
  50. v
  51. v
  52. v
  53. v
  54. f Scalability
  55. v
  56. v
  57. v
  58. f Context aware authentication
  59. V
  60. F f DUDA
  61. v
  62. v
  63. v
  64. f DUDA
  65. f CASB
  66. v
  67. v
  68. v
  69. v
  70. v
  71. V
  72. V
  73. f DUDA
  74. f DUDA
  75. V
  76. V
  77. V
  78. DUDA
  79. V
  80. V
  81. V
  82. V
  83. V
  84. V
  85. DUDA
  86. V
  87. V https://www.examtopics.com/exams/comptia/sy0-601/view/15/
  88. V
  89. V
  90. V
  91. v
  92. v
  93. v
  94. v
  95. v REVIEW
  96. REVIEW
  97. REVIEW
  98. REVIEW
  99. V
  100. V
  101. f AUP
  102. v
  103. v
  104. v
  105. v
  106. f certs
  107. v
  108. v
  109. v
  110. v
  111. V
  112. F
  113. V
  114. V
  115. V
  116. f datacenter
  117. v
  118. f rtor
  119. v
  120. v
  121. f vuln
  122. v
  123. v
  124. f fog
  125. v
  126. f CASB
  127. f
  128. v
  129. v
  130. f DUDA
  131. f DUDA
  132. v
  133. v
  134. f dnnsec
  135. v
  136. v CIS benchmarks
  137. f DUDA
  138. v
  139. v
  140. v
  141. v
  142. . f DUDA
  143. v
  144. vf DUDA // creo q ya entiiendo
  145. v
  146. v
  147. v
  148. f DUDA
  149. v
  150. v
  151. V
  152. V
  153. V
  154. V
  155. V
  156. f DUDA
  157. V
  158. V
  159. V
  160. V
  161. V
  162. V
  163. f RISK REGISTER
  164. v brazil
  165. v
  166. f soar
  167. v
  168. v
  169. v
  170. v
  171. V
  172. V
  173. V
  174. f tokeni
  175. f DUDA
  176. v
  177. f nose broi
  178. v
  179. . f DUDA
  180. vc
  181. V
  182. V
  183. F
  184. F During a recent incident, an external attacker was able to exploit an SMB vulnerability over the internet. Which of the following action items should a security analyst perform FIRST to prevent this from occurring again?