CompTIA SY0-601 Exam Practice Questions (P. 2)
- Full Access (860 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?
- ADLPMost Voted
- BNIDS
- CTPM
- DFDE
Correct Answer:
A
A

Data Loss Prevention (DLP) is undeniably essential in preventing data exfiltration within a digital environment. Its capabilities include real-time and at-rest content inspection, ensuring sensitive data types such as PII, or intellectual property, are identified and securely handled. Additionally, DLP systems employ policy-based controls that enforce specific handling and protection mandates for identified data, enhancing the security measures against unauthorized access or transfer. Key aspects like network monitoring and integrated encryption bolster its efficacy by monitoring for irregular activities and securing data against interceptions, thereby making it a comprehensive solution for protecting sensitive information on a network.
send
light_mode
delete
Question #12
Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?
- AReplacing the traditional key with an RFID keyMost Voted
- BInstalling and monitoring a camera facing the door
- CSetting motion-sensing lights to illuminate the door on activity
- DSurrounding the property with fencing and gates
Correct Answer:
A
A

Replacing a traditional key with an RFID system is a solid move to rev up security precisely where it’s needed. It squashes the old-school lock-picking problem because, frankly, you can't pick what isn't there. Plus, RFID keys aren't just about getting in; they keep a neat log of who comes and goes. Super handy for keeping tabs and all that. So, yeah, switching to RFID is all about hitting that beef-up button on door security without making a whole song and dance about perimeters or lights. Just simple, straight to the point—better locks for better security.
send
light_mode
delete
Question #13
Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?
- AHashingMost Voted
- BTokenization
- CMasking
- DEncryption
Correct Answer:
A
A

Hashing stands out for ensuring password security without exposing the original credentials. In security practices, it involves transforming passwords into a unique fixed-size string or hash. Because this process is one-way, the original password can't be easily derived from the hash. Monitoring tools use this hash to check against databases of leaked hashes. If a match is found, it suggests the password is compromised, effectively detecting breaches without needing to access or reveal the password itself. This method is secure and privacy-preserving, making hashing the optimal choice for such applications.
send
light_mode
delete
Question #14
A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?
- AS/MIME
- BLDAPS
- CSSHMost Voted
- DSRTP
Correct Answer:
C
C

When considering a secure file transfer over the internet, using SSH, or Secure Shell, is a practical choice. SSH not only encrypts the file during the transfer, protecting it from unauthorized access, but it can also incorporate FTP through SFTP (SSH File Transfer Protocol), enhancing security measures while ensuring file integrity. This combination adheres to the required secure connection mentioned in the scenario, offering a reliable method for sending files to a business partner over the internet. Remember, SSL offers a secure channel regardless of the specific application, making it a versatile choice in many circumstances.
send
light_mode
delete
Question #15
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?
- APerform a mathematical operation on the passwords that will convert them into unique strings.Most Voted
- BAdd extra data to the passwords so their length is increased, making them harder to brute force.
- CStore all passwords in the system in a rainbow table that has a centralized location.
- DEnforce the use of one-time passwords that are changed for every login session.
Correct Answer:
A
A

Hashing is a recommended security measure for protecting user passwords by converting them into unique, fixed-length strings using a mathematical function. This process is irreversible, which means that original passwords cannot be derived from their hashes. By implementing hashing, an administrator ensures that even if the password database is compromised, the actual passwords remain secure. When users log in, the system hashes the entered password and compares it to the stored hash; matching hashes verify the user's identity without revealing the actual password. This approach enhances security by safeguarding user credentials.
send
light_mode
delete
Question #16
Which of the following would be indicative of a hidden audio file found inside of a piece of source code?
- ASteganographyMost Voted
- BHomomorphic encryption
- CCipher suite
- DBlockchain
Correct Answer:
A
A
send
light_mode
delete
Question #17
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen:
Please use a combination of numbers, special characters, and letters in the password field.
Which of the following concepts does this message describe?
Please use a combination of numbers, special characters, and letters in the password field.
Which of the following concepts does this message describe?
- APassword complexityMost Voted
- BPassword reuse
- CPassword history
- DPassword age
Correct Answer:
A
A
send
light_mode
delete
Question #18
A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures. The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?
send
light_mode
delete
Question #19
Which of the following is a reason to publish files' hashes?
- ATo validate the integrity of the filesMost Voted
- BTo verify if the software was digitally signed
- CTo use the hash as a software activation key
- DTo use the hash as a decryption passphrase
Correct Answer:
A
A
send
light_mode
delete
Question #20
A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?
- Anslookup 10.10.10.0
- Bnmap -p 80 10.10.10.0/24Most Voted
- Cpathping 10.10.10.0 -p 80
- Dne -l -p 80
Correct Answer:
B
B
send
light_mode
delete
All Pages