comptia security+ exam

16
CompTIA Security+ Exam CompTIA SY0-601 Version Demo Total Demo Questions: 15 Total Premium Questions: 359 Buy Premium PDF https://dumpsboss.com [email protected]

Upload: others

Post on 15-Mar-2022

9 views

Category:

Documents


0 download

TRANSCRIPT

CompTIA Security+ ExamCompTIA SY0-601

Version Demo

Total Demo Questions: 15

Total Premium Questions: 359

Buy Premium PDF

https://dumpsboss.com

[email protected]

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

QUESTION NO: 1

During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company’s naming convention and are not in the asset inventory. WiFi access is protected with 256-bit encryption via WPA2. Physical access to the company’s facility requires two-factor authentication using a badge and a passcode. Which of the following should the administrator implement to find and remediate the issue? (Choose two.)

A. Check the SIEM for failed logins to the LDAP directory.

B. Enable MAC filtering on the switches that support the wireless network.

C. Run a vulnerability scan on all the devices in the wireless network.

D. Deploy multifactor authentication for access to the wireless network.

E. Scan the wireless network for rogue access points.

F. Deploy a honeypot on the network.

ANSWER: B E

QUESTION NO: 2

A security engineer needs to implement the following requirements:

All Layer 2 switches should leverage Active Directory for authentication.

All Layer 2 switches should use local fallback authentication of Active Directory is offline. All Layer 2 switches are not the same and are manufactured by several vendors.

Which of the following actions should the engineer take to meet these requirements? (Choose two.)

A. Implement RADIUS.

B. Configure AAA on the switch with local login as secondary.

C. Configure port security on the switch with the secondary login method.

D. Implement TACACS+.

E. Enable the local firewall on the Active Directory server.

F. Implement a DHCP server.

ANSWER: A C

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

QUESTION NO: 3 - (DRAG DROP)

DRAG DROP

Leveraging the information supplied below, complete the CSR for the server to set up TLS (HTTPS).

Hostname: ws01

Domain: comptia.org

IPv4: 10.1.9.50

IPv4: 10.2.10.50

Root: home.aspx

DNS CNAME: homesite

INSTRUCTIONS

Drag the various data points to the correct locations within the CSR. Extension criteria belong in the left-hand column and values belong in the corresponding row in the right-hand column.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Select and Place:

ANSWER:

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

Explanation:

QUESTION NO: 4

A recent audit uncovered a key finding regarding the use of a specific encryption standard in a web application that is used to communicate with business customers. Due to the technical limitations of its customers, the company is unable to upgrade the encryption standard. Which of the following types of controls should be used to reduce the risk created by this scenario?

A. Physical

B. Detective

C. Preventive

D. Compensating

ANSWER: D

QUESTION NO: 5

Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Choose two.)

A. Block cipher

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

B. Hashing

C. Private key

D. Perfect forward secrecy

E. Salting

F. Symmetric keys

ANSWER: B C

QUESTION NO: 6 - (SIMULATION)

SIMULATION

A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802.1X using the most secure encryption and protocol available.

INSTRUCTIONS

Perform the following steps:

1. Configure the RADIUS server.

2. Configure the WiFi controller.

3. Preconfigure the client for an incoming guest. The guest AD credentials are:

User: guest01

Password: guestpass

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

ANSWER: See explanation below.

Explanation:

Configure the settings as shown below:

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

QUESTION NO: 7

An organization routes all of its traffic through a VPN. Most users are remote and connect into a corporate datacenter that houses confidential information. There is a firewall at the Internet border, followed by a DLP appliance, the VPN server, and the datacenter itself. Which of the following is the WEAKEST design element?

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

A. The DLP appliance should be integrated into a NGFW

B. Split-tunnel connections can negatively impact the DLP appliance’s performance

C. Encrypted VPN traffic will not be inspected when entering or leaving the network

D. Adding two hops in the VPN tunnel may slow down remote connections

ANSWER: C

QUESTION NO: 8 - (HOTSPOT)

HOTSPOT

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS

Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Hot Area:

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

ANSWER:

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

Explanation:

QUESTION NO: 9

An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?

A. Date of birth

B. Fingerprints

C. PIN

D. TPM

ANSWER: B

QUESTION NO: 10

A security analyst needs to perform periodic vulnerability scans on production systems. Which of the following scan types would produce the BEST vulnerability scan report?

A. Port

B. Intrusive

C. Host discovery

D. Credentialed

ANSWER: D

QUESTION NO: 11

A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS. Which of the following must be part of the security architecture to achieve AAA? (Choose two.)

A. DNSSEC

B. Reverse proxy

C. VPN concentrator

D. PKI

E. Active Directory

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

F. RADIUS

ANSWER: E F

Explanation:

Reference: https://docs.aerohive.com/330000/docs/guides/EAP-TLS_NPS_RADIUS_Server.pdf

QUESTION NO: 12

While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following is MOST likely occurring?

A. A RAT was installed and is transferring additional exploit tools.

B. The workstations are beaconing to a command-and-control server.

C. A logic bomb was executed and is responsible for the data transfers.

D. A fireless virus is spreading in the local network environment.

ANSWER: A

QUESTION NO: 13

A company wants to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss. Which of the following would be the BEST backup strategy to implement?

A. Incremental backups followed by differential backups

B. Full backups followed by incremental backups

C. Delta backups followed by differential backups

D. Incremental backups followed by delta backups

E. Full backups followed by differential backups

ANSWER: E

QUESTION NO: 14

A technician needs to prevent data loss in a laboratory. The laboratory is not connected to any external networks. Which of the following methods would BEST prevent the exfiltration of data? (Choose two.)

DumpsBoss - Pass Your Next Certification Exam Fast!dumpsboss.com

A. VPN

B. Drive encryption

C. Network firewall

D. File-level encryption

E. USB blocker

F. MFA

ANSWER: B E

QUESTION NO: 15

Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company’s final software releases? (Choose two.)

A. Unsecure protocols

B. Use of penetration-testing utilities

C. Weak passwords

D. Included third-party libraries

E. Vendors/supply chain

F. Outdated anti-malware software

ANSWER: A C