CompTIA Security+ SY0-601 Practice Questions and Correct Answers 100% Verified.
CompTIA Security+ SY0-601 Practice Questions and Correct Answers 100% Verified. The user installed Trojan horse malware. - Correct Answer A user used an administrator account to download and install a software application. After the user launched the .exe extension installer file, the user experienced frequent crashes, slow computer performance, and strange services running when turning on the computer. What most likely happened to cause these issues? A worm - Correct Answer A security operations center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices a rapid consumption of network bandwidth, causing a Denial of Service (DoS). What type of virus is this? PUP (potentially unwanted program) - Correct Answer A user purchased a laptop from a local computer shop. After powering on the laptop for the first time, the user noticed a few programs like Norton Antivirus asking for permission to install. How would an IT security specialist classify these programs? -Uses lightweight shellcode -Uses low observable characteristic attacks - Correct Answer A fileless malicious software can replicate between processes in memory on a local host or over network shares. What other behaviors and techniques would classify malware as fileless rather than a normal virus? (Select all that apply.) -Computer Bots, -Command & Control - Correct Answer An attacker is planning to set up a backdoor that will infect a set of specific computers at an organization, to inflict a set of other intrusion attacks remotely. Which of the following will support the attackers' plan? (Select all that apply.) -Launch a Distributed Denial of Service (DDoS) attack -Establish a connection with a Command and Control server -Launch a mass-mail spam attack - Correct Answer If a user's computer becomes infected with a botnet, which of the following can this compromise allow the attacker to do? (Select all that apply.) Have up-to-date backups. - Correct Answer If a user's device becomes infected with crypto-malware, which of the following is the best way to mitigate this compromise?
Written for
- Institution
- CompTIA Security+ SY0-601
- Course
- CompTIA Security+ SY0-601
Document information
- Uploaded on
- April 3, 2024
- Number of pages
- 20
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- a worm
-
the user installed trojan horse malware
-
pup potentially unwanted program
-
uses lightweight shellcode uses low observable c
Also available in package deal