This page was exported from Free Exams Dumps Materials [ http://exams.dumpsmaterials.com ]
Export date: Thu Nov 21 17:07:24 2024 / +0000 GMT

SY0-601 Tested & Approved CompTIA Security+ Study Materials [Q50-Q70]




SY0-601 Tested & Approved CompTIA Security+ Study Materials

Validate your Skills with Updated CompTIA Security+ Exam Questions & Answers and Test Engine

Q50. An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfer the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?

 
 
 
 

Q51. A company is experiencing an increasing number of systems that are locking up on Windows startup. The security analyst clones a machine, enters into safe mode, and discovers a file in the startup process that runs Wstart.bat.
@echo off
:asdhbawdhbasdhbawdhb
start notepad.exe
start notepad.exe
start calculator.exe
start calculator.exe
goto asdhbawdhbasdhbawdhb
Given the file contents and the system’s issues, which of the following types of malware is present?

 
 
 
 

Q52. A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected?

 
 
 
 

Q53. Which of the following utilize a subset of real data and are MOST likely to be used to assess the features and functions of a system and how it interacts or performs from an end user’s perspective against defined test cases? (Select TWO).

 
 
 
 
 
 

Q54. Acritical file server is being upgraded and the systems administrator must determine which RAID level the new server will need to achieve parity and handle two simultaneous disk failures. Which of the following RAID levels meets this requirements?

 
 
 
 

Q55. A security modern may have occurred on the desktop PC of an organization’s Chief Executive Officer (CEO) A duplicate copy of the CEO’s hard drive must be stored securely to ensure appropriate forensic processes and the chain of custody are followed. Which of the following should be performed to accomplish this task?

 
 
 
 

Q56. A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?

 
 
 
 

Q57. A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?

 
 
 
 
 

Q58. While checking logs, a security engineer notices a number of end users suddenly downloading files with the
.tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following is MOST likely occurring?

 
 
 
 

Q59. A junior security analyst iss conducting an analysis after passwords were changed on multiple accounts without users’ interaction. The SIEM have multiple logtn entnes with the following text:

Which of Ihe following is the MOST likely attack conducted on the environment?

 
 
 
 

Q60. A cybersecurity administrator is using iptables as an enterprise firewall. The administrator created some rules, but the network now seems to be unresponsive All connections are being dropped by the firewall.
Which of the following would be the BEST option to remove the rules?

 
 
 
 

Q61. A network administrator at a large organization Is reviewing methods to improve the security of the wired LAN Any security improvement must be centrally managed and allow corporate-owned devices to have access to the intranet but limit others to Internet access only. Which of the following should the administrator recommend?

 
 
 
 

Q62. A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.

 
 
 
 

Q63. Which of the following is the MOST likely reason for securing an air-gapped laboratory HVAC system?

 
 
 
 

Q64. Which of the following BEST describes the method a security analyst would use to confirm a file that is downloaded from a trusted security website is not altered in transit or corrupted using a verified checksum?

 
 
 
 

Q65. Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?

 
 
 
 

Q66. A security analyst is reviewing web-application logs and finds the following log:

Which of the following attacks is being observed?

 
 
 
 

Q67. A security engineer has enabled two-factor authentication on all workstations. Which of the following approaches are the MOST secure? (Select TWO).

 
 
 
 
 
 

Q68. Given the following logs:

Which of the following BEST describes the type of attack that is occurring?

 
 
 
 

Q69. The SOC is reviewing processes and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best course of action. This allowed the malware to spread to additional hosts before it was contained. Which of the following would be BEST to improve the incident response process?

 
 
 
 

Q70. A systems analyst is responsible for generating a new digital forensics chain-of-custody form.
Which of the following should the analyst include in this documentation? (Choose two.)

 
 
 
 
 
 

SY0-601 [Dec-2022] Newly Released] SY0-601 Exam Questions For You To Pass: https://www.dumpsmaterials.com/SY0-601-real-torrent.html

Post date: 2022-12-16 09:31:00
Post date GMT: 2022-12-16 09:31:00
Post modified date: 2022-12-16 09:31:00
Post modified date GMT: 2022-12-16 09:31:00