Win IT Exam with Last Dumps 2024


CompTIA SY0-601 Exam

Page 13/13
Viewing Questions 121 130 out of 130 Questions
100.00%

Question 121
A database administrator wants to grant access to an application that will be reading and writing data to a database. The database is shared by other applications also used by the finance department. Which of the following account types is MOST appropriate for this purpose?




Question 122
A security analyst generated a file named host1.pcap and shared it with a team member who is going to use it for further incident analysis. Which of the following tools will the other team member MOST likely use to open this file?




Question 123
An application developer accidentally uploaded a company's code-signing certificate private key to a public web server. The company is concerned about malicious use of its certificate. Which of the following should the company do FIRST?




Question 124
An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps. Which of the following control types has the organization implemented?




Question 125
The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access. Which of the following is the BEST security solution to reduce this risk?





Question 126
A technician enables full disk encryption on a laptop that will be taken on a business trip. Which of the following does this process BEST protect?




Question 127
A security analyst was called to investigate a file received directly from a hardware manufacturer. The analyst is trying to determine whether the file was modified in transit before installation on the user's computer. Which of the following can be used to safely assess the file?




Question 128
A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity incident response team. The caller asks the technician to verify the network's internal firewall IP Address. Which of the following is the technician's BEST course of action?




Question 129
Which of the following would BEST provide detective and corrective controls for thermal regulation?




Question 130
Which of the following is a benefit of including a risk management framework into an organization's security approach?