Win IT Exam with Last Dumps 2024

CompTIA SY0-601 Exam

Page 2/13
Viewing Questions 11 20 out of 130 Questions

Question 11
Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?

Question 12
Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment?

Question 13
Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?

Question 14
A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send the file to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?

Question 15
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?

Question 16
Which of the following would be indicative of a hidden audio file found inside of a piece of source code?

Question 17
A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen:
Please use a combination of numbers, special characters, and letters in the password field.
Which of the following concepts does this message describe?

Question 18
A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures. The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?

Question 19
Which of the following is a reason to publish files' hashes?

Question 20
A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?