[May-2022] Latest CompTIA SY0-601 exam dumps and online Test Engine [Q91-Q112]

[May-2022] Latest CompTIA SY0-601 exam dumps and online Test Engine

CompTIA SY0-601: Selling CompTIA Security+ Products and Solutions

NEW QUESTION 91
An organization relies on third-party video conferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would BEST maintain high-quality video conferencing while minimizing latency when connected to the VPN?

 
 
 
 

NEW QUESTION 92
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
A)

B)

C)

D)

 
 
 
 

NEW QUESTION 93
An enterprise has hired an outside security firm to conduct penetration testing on its network and applications. The firm has only been given the documentation available to the customers of the applications. Which of the following BEST represents the type of testing that will occur?

 
 
 
 

NEW QUESTION 94
An analyst visits an Internet forum looking for information about a tool. The analyst finds a thread that appears to contain relevant information. One of the posts says the following:

Which of the following BEST describes the attack that was attempted against the forum readers?

 
 
 
 

NEW QUESTION 95
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

NEW QUESTION 96
A security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices the following requirements must be met:
* Mobile device OSs must be patched up to the latest release
* A screen lock must be enabled (passcode or biometric)
* Corporate data must be removed if the device is reported lost or stolen Which of the following controls should the security engineer configure? (Select TWO)

 
 
 
 
 
 

NEW QUESTION 97
An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?

 
 
 
 

NEW QUESTION 98
A user recently attended an exposition and received some digital promotional materials The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open Which of the following is MOST likely the cause of the reported issue?

 
 
 
 

NEW QUESTION 99
A bank detects fraudulent activity on user’s account. The user confirms transactions completed yesterday on the bank’s website at https://www.company.com. A security analyst then examines the user’s
Internet usage logs and observes the following output:
date; username; url;destinationport; responsecode
2020-03-01; userann; http: //www.company.org/;80;302
2020-03-01; userann: http: //www.company.org/secure_login/;80;200
2020-03-01; userann:http: //www.company.org/dashboard/;80;200
Which of the following has MOST likely occurred?

 
 
 
 

NEW QUESTION 100
Users at organization have been installing programs from the internet on their workstations without first proper authorization. The organization maintains a portal from which users can install standardized programs.
However, some users have administrative access on their workstations to enable legacy programs to function property. Which of the following should the security administrator consider implementing to address this issue?

 
 
 
 

NEW QUESTION 101
A security analyst needs to make a recommendation for restricting access to certain segments of the network using only data-link layer security. Which of the following controls will the analyst MOST likely recommend?

 
 
 
 

NEW QUESTION 102
During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company’s naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to the company’s facility requires two-factor authentication using a badge and a passcode.
Which of the following should the administrator implement to find and remediate the Issue?
(Select TWO).

 
 
 
 
 
 

NEW QUESTION 103
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

NEW QUESTION 104
A500 is implementing an insider threat detection program, The primary concern is that users may be accessing confidential data without authorization. Which of the fallowing should be deployed to detect a potential insider threat?

 
 
 
 

NEW QUESTION 105
An engineer needs to deploy a security measure to identify and prevent data tampering within the enterprise. Which of the following will accomplish this goal?

 
 
 
 

NEW QUESTION 106
A security analyst needs to make a recommendation for restricting access to certain segments of the network using only data-link layer security. Which of the following controls will the analyst MOST likely recommend?

 
 
 
 

NEW QUESTION 107
A network administrator has been asked to install an IDS to improve the security posture of an organization. Which of the following control types is an IDS?

 
 
 
 

NEW QUESTION 108
The
website http://companywebsite.com requires users to provide personal Information, Including security question responses, for registration. Which of the following would MOST likely cause a data breach?

 
 
 
 

NEW QUESTION 109
To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials.
Which of the following will BEST ensure the site’s users are not compromised after the reset?

 
 
 
 

NEW QUESTION 110
Leveraging the information supplied below, complete the CSR for the server to set up TLS (HTTPS)
* Hostname: ws01
* Domain: comptia.org
* IPv4: 10.1.9.50
* IPV4: 10.2.10.50
* Root: home.aspx
* DNS CNAME:homesite.
Instructions:
Drag the various data points to the correct locations within the CSR. Extension criteria belong in the let hand column and values belong in the corresponding row in the right hand column.

NEW QUESTION 111
A global pandemic is forcing a private organization to close some business units and reduce staffing at others.
Which of the following would be BEST to help the organization’s executives determine their next course of action?

 
 
 
 

NEW QUESTION 112
A external forensics investigator has been hired to investigate a data breach at a large enterprise with numerous assets. It is known that the breach started in the DMZ and moved to the sensitive information, generating multiple logs as the attacker traversed through the network.
Which of the following will BEST assist with this investigation?

 
 
 
 

New 2022 SY0-601 Test Tutorial (Updated 546 Questions): https://www.trainingdump.com/CompTIA/SY0-601-practice-exam-dumps.html