During a recent penetration test, the tester discovers large amounts of data were exfiltrated over the course of 12 months via the internet. The penetration tester stops the test to inform the client of the findings Which of the following should be the client's NEXT step to mitigate the issue''
A. Conduct a full vulnerability scan to identify possible vulnerabilities
B. Perform containment on the critical servers and resources
C. Review the firewall and identify the source of the active connection
D. Disconnect the entire infrastructure from the internet
Sales team members have been receiving threatening voicemail messages and have reported these incidents to the IT security team. Which of the following would be MOST appropriate for the IT security team to analyze?
A. Access control
B. Syslog
C. Session Initiation Protocol traffic logs
D. Application logs
A security administrator is managing administrative access to sensitive systems with the following requirements:
Common login accounts must not be used for administrative duties.
Administrative accounts must be temporal in nature.
Each administrative account must be assigned to one specific user.
Accounts must have complex passwords.
Audit trails and logging must be enabled on all systems.
Which of the following solutions should the administrator deploy to meet these requirements? (Give and References from CompTIA Security+ SY0-601 Official Text Book and Resources)
A. ABAC
B. SAML
C. PAM
D. CASB
A security administrator Installed a new web server. The administrator did this to increase the capacity (or an application due to resource exhaustion on another server. Which of the following algorithms should the administrator use to split the number of the connections on each server In half?
A. Weighted response
B. Round-robin
C. Least connection
D. Weighted least connection
A Chief Information Security Officer (CISO) is evaluating the dangers involved in deploying a new ERP system for the company. The CISO categorizes the system, selects the controls that apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system. Which of the following is the CISO using to evaluate the environment for this new ERP system?
A. The Diamond Model of Intrusion Analysis
B. CIS Critical Security Controls
C. NIST Risk Management Framework
D. ISO 27002
An organization has hired a red team to simulate attacks on its security posture. Which of the following will the blue team do after detecting an IoC?
A. Reimage the impacted workstations
B. Activate runbooks for incident response
C. Conduct forensics on the compromised system
D. Conduct passive reconnaissance to gather information
A secunity engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?
A. An air gap
B. A hot site
C. A VUAN
D. A screened subnet
A company recently expenenced an attack dunng which #5 main website was directed to the atacker's web server, allowing the attacker to harvest credentials from unsuspecting customers. Which of the following snould the company Implement to prevent this type of attack from accurting in the future?
A. IPSec
B. SSL/TLS
C. DNSSEC
D. S/MIME
A company ts required to continue using legacy softveare to support a critical service. Which of the following BEST explains a reek of this prachce?
A. Default system configuraton
B. Unsecure protocols
C. Lack of vendor support
D. Weak encryption
The spread of misinformation sorrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take risk of goding to the polls. This is an example of:
A. Prepending
B. An influence compain
C. A watering-hole attack.
D. Intimidation.
E. Information elicitation.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.