Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

SY0-601 Questions and Answers

Question # 4

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done FIRST?

A.

Configure heat maps.

B.

Utilize captive portals.

C.

Conduct a site survey.

D.

Install Wi-Fi analyzers.

Full Access
Question # 5

A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information. Which of the following would BEST meet these objectives?

A.

WAF

B.

CASB

C.

VPN

D.

TLS

Full Access
Question # 6

An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following solutions should the engineer implement?

A.

Proxy server

B.

WAF

C.

Load balancer

D.

VPN

Full Access
Question # 7

An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?

A.

Perform a mathematical operation on the passwords that will convert them into umgue stnngs

B.

Add extra data to the passwords so their length is increased, making them harder to brute force

C.

Store all passwords in the system in a rainbow table that has a centralized location

D.

Enforce the use of one-time passwords that are changed for every login session.

Full Access
Question # 8

A news article states hackers have been selling access to IoT camera feeds. Which of the following is the Most likely reason for this issue?

A.

Outdated software

B.

Weak credentials

C.

Lack of encryption

D.

Backdoors

Full Access
Question # 9

After a recent security breach a security analyst reports that several admimstratrve usemames and passwords are being sent via cieartext across the network to access network devices over prot 23 Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configunng network devices?

A.

SSH

B.

SNMPv3

C.

SFTP

D.

Telnet

E.

FTP

Full Access
Question # 10

A network engineer created two subnets that will be used for production and development servers. Per security policy, production and development servers must each have a dedicated network that cannot communicate with one another directly. Which of the following should be deployed so that server administrators can access these devices?

A.

VLANS

B.

Internet proxy servers

C.

NIDS

D.

Jump servers

Full Access
Question # 11

An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?

A.

FRR

B.

Difficulty of use

C.

Cost

D.

FAR

E.

CER

Full Access
Question # 12

A routine audit of medical billing claims revealed that several claims were submitted without the subscriber's knowledge. A review of the audit logs for the medical billing company's system indicated a company employee downloaded customer records and adjusted the direct deposit information to a personal bank account. Which of the following does this action describe?

A.

Insider threat

B.

Social engineering

C.

Third-party risk

D.

Data breach

Full Access
Question # 13

A security analyst is evaluating solutions to deploy an additional layer of protection for a web application The goal is to allow only encrypted communications without relying on network devices Which of the following can be implemented?

A.

HTTP security header

B.

DNSSEC implementation

C.

SRTP

D.

S/MIME

Full Access
Question # 14

An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced next year?

A.

ALE

B.

ARO

C.

RPO

D.

SLE

Full Access
Question # 15

A security analyst is receiving numerous alerts reporting that the response time of an internet-facing application has been degraded However, the internal network performance was not degraded. Which of the following MOST likely explains this behavior?

A.

DNS poisoning

B.

MAC flooding

C.

DDoS attack

D.

ARP poisoning

Full Access
Question # 16

A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an Iv1FA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

A.

Context-aware authentication

B.

Simultaneous authentication of equals

C.

Extensive authentication protocol

D.

Agentless network access control

Full Access
Question # 17

An audit Identified Pll being utilized In the development environment of a critical application. The Chief Privacy Officer (CPO) Is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?

A.

Data anonymlzallon

B.

Data encryption

C.

Data masking

D.

Data tokenization

Full Access
Question # 18

An organization implemented a process that compares the settings currently configured on systems against secure configuration guidelines in order to identify any gaps Which of the following control types has the organization implemented?

A.

Compensating

B.

Corrective

C.

Preventive

D.

Detective

Full Access
Question # 19

An employee received a word processing file that was delivered as an email attachment The subject line and email content enticed the employee to open the attachment. Which of the following attack vectors BEST matches this malware?

A.

Embedded Python code

B.

Macro-enabled file

C.

Bash scripting

D.

Credential-harvesting website

Full Access
Question # 20

A security analyst in a SOC has been tasked with onboarding a new network into the SIEM. Which of the following BEST describes the information that should feed into a SIEM solution in order to adequately support an investigation?

A.

Logs from each device type and security layer to provide correlation of events

B.

Only firewall logs since that is where attackers will most likely try to breach the network

C.

Email and web-browsing logs because user behavior is often the cause of security breaches

D.

NetFlow because it is much more reliable to analyze than syslog and will be exportable from every device

Full Access
Question # 21

Which biometric error would allow an unauthorized user to access a system?

A.

False acceptance

B.

False entrance

C.

False rejection

D.

False denial

Full Access
Question # 22

A security analyst is investigating suspicious traffic on the web server located at IP address 10.10.1.1. A search of the WAF logs reveals the following output:

Which of the following is MOST likely occurring?

A.

XSS attack

B.

SQLi attack

C.

Replay attack

D.

XSRF attack

Full Access
Question # 23

A security analyst is evaluating the risks of authorizing multiple security solutions to collect data from the company's cloud environment Which of the following is an immediate consequence of these integrations?

A.

Non-compliance with data sovereignty rules

B.

Loss of the vendor's interoperability support

C.

Mandatory deployment of a SIEM solution

D.

Increase in the attack surface

Full Access
Question # 24

After multiple on premises security solutions were migrated to the cloud, the incident response time increased. The analyst are spending a long time to trace information on different cloud consoles and correlating data in different formats. Which of the following can be used to optimize the incident response time?

A.

CASB

B.

VPC

C.

SWG

D.

CMS

Full Access
Question # 25

Which of the following terms describes a broad range of information that is sensitive to a specific organization?

A.

Public

B.

Top secret

C.

Proprietary

D.

Open-source

Full Access
Question # 26

A recent security breach exploited software vulnerabilities in the firewall and within the network management solution. Which of the following will MOST likely be used to identify when the breach occurred through each device?

A.

SIEM correlation dashboards

B.

Firewall syslog event logs

C.

Network management solution login audit logs

D.

Bandwidth monitors and interface sensors

Full Access
Question # 27

A security analyst receives an alert from trie company's SIEM that anomalous activity is coming from a local source IP address of 192.168.34.26. The Chief Information Security Officer asks the analyst to block the originating source Several days later, another employee opens an internal ticket stating that vulnerability scans are no longer being performed properly. The IP address the employee provides is 192 168.3426. Which of the following describes this type of alert?

A.

True positive

B.

True negative

C.

False positive

D.

False negative

Full Access
Question # 28

An attacker replaces a digitally signed document with another version that foes unnoticed. Upon reviewing the document’s contents, the author notices some additional verbaige that was not originally in the document but can’t validate an integrity issue. Which of the following attacks was used?

A.

Cryptomalware

B.

Prepending

C.

Collision

D.

Phising

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 17 Aug 2022