Comptia Security + SY0-601 Exam (2023/
2024 Update) Questions and Verified
Answers| 100% Correct| Grade A| NEW
QUESTION
In which of the
... [Show More] following situations would it be BEST to use a detective control type for
mitigation?
A. A company implemented a network load balancer to ensure 99.999% availability of its web
application.
B. A company designed a backup solution to increase the chances of restoring services in case of
a
natural disaster.
C. A company purchased an application-level firewall to isolate traffic between the accounting
departmentand the information technology department.
D. A company purchased an IPS system, but after reviewing the requirements, the appliance
wassupposed to monitor, not block, any traffic.
E. A company purchased liability insurance for flood protection on all capital assets.
Answer:
D
QUESTION
A security analyst receives a SIEM alert that someone logged in to the appadmin test account,
which is only used for the early detection of attacks. The security analyst then reviews the
following
application log:
Which of the following can the security analyst conclude?
A. A replay attack is being conducted against the application.
B. An injection attack is being conducted against a user authentication system.
C. A service account password may have been changed, resulting in continuous failed logins
within
theapplication.
D. A credentialed vulnerability scanner attack is testing several CVEs against the application.
Answer:
C
QUESTION
The IT department's on-site developer has been with the team for many years. Each time an
application is released, the security team is able to identify multiple vulnerabilities. Which of the
following would BEST help the team ensure the application is ready to be released to
production?
A. Limit the use of third-party libraries.
B. Prevent data exposure queries.
C. Obfuscate the source code.
D. Submit the application to QA before releasing it.
Answer:
D
QUESTION
A cybersecurity analyst needs to implement secure authentication to third-party websites
without users' passwords. Which of the following would be the BEST way to achieve this
objective?
A. OAuth
B. SSO
C. SAML
D. PAP
Answer:
A
QUESTION
An analyst needs to identify the applications a user was running and the files that were open
before the user's computer was shut off by holding down the power button. Which of the
following would MOST likely contain that information?
A. NGFW
B. Pagefile
C. NetFlow
D. RAM
Answer:
B
QUESTION
A remote user recently took a two-week vacation abroad and brought along a corporate-owned
laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN.
Which of the following is the MOST likely reason for the user's inability to connect the laptop to
the VPN?
A. Due to foreign travel, the user's laptop was isolated from the network.
B. The user's laptop was quarantined because it missed the latest path update.
C. The VPN client was blacklisted.
D. The user's account was put on a legal hold.
Answer:
A
QUESTION
In which of the following common use cases would steganography be employed?
A. Obfuscation
B. Integrity
C. Non-repudiation
D. Blockchain
Answer:
A
QUESTION
To secure an application after a large data breach, an e-commerce site will be resetting all users'
credentials. Which of the following will BEST ensure the site's users are not compromised after
the reset?
A. A password reuse policy
B. Account lockout after three failed attempts
C. Encrypted credentials in transit
D. A geofencing policy based on login history
Answer:
C
QUESTION
In which of the following risk management strategies would cybersecurity insurance be used? [Show Less]