100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ (SY0-601) DION PRACTICE Exam 2024

Rating
-
Sold
-
Pages
85
Grade
A+
Uploaded on
13-08-2024
Written in
2024/2025

CompTIA Security+ (SY0-601) DION PRACTICE Exam 2024

Institution
CompTIA Security+ \\
Course
CompTIA Security+ \\











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Security+ \\
Course
CompTIA Security+ \\

Document information

Uploaded on
August 13, 2024
Number of pages
85
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA Security+ (SY0-601) DION
PRACTICE Exam 2024
Which protocol relies on mutual authentication of the client and the server for its
security?



CHAP

LDAPS

Two-factor authentication

RADIUS - LDAPS



Explanation

OBJ-3.1: The Lightweight Directory Access Protocol (LDAP) uses a client-server
model for mutual authentication. LDAP is used to enable access to a directory of
resources (workstations, users, information, etc.). TLS provides mutual
authentication between clients and servers. Since Secure LDAP (LDAPS) uses TLS,
it provides mutual authentication.



You have just completed identifying, analyzing, and containing an incident. You
have verified that the company uses self-encrypting drives as part of its default
configuration. As you begin the eradication and recovery phase, you must sanitize
the storage devices' data before restoring the data from known-good backups.
Which of the following methods would be the most efficient to use to sanitize the
affected hard drives?

,CompTIA Security+ (SY0-601) DION
PRACTICE Exam 2024

Incinerate and replace the storage devices

Perform a cryptographic erase (CE) on the storage devices

Conduct zero-fill on the storage devices

Use a secure erase (SE) utility on the storage devices - Perform a cryptographic
erase (CE) on the storage devices



Explanation

OBJ-2.7: Sanitizing a hard drive can be done using cryptographic erase (CE), secure
erase (SE), zero-fill, or physical destruction. In this case, the hard drives already
used data at rest. Therefore, the most efficient method would be to choose CE.
The cryptographic erase (CE) method sanitizes a self-encrypting drive by erasing
the media encryption key and then reimaging the drive. A secure erase (SE) is
used to perform the sanitization of flash-based devices (such as SSDs or USB
devices) when cryptographic erase is not available. The zero-fill method relies on
overwriting a storage device by setting all bits to the value of zero (0), but this is
not effective on SSDs or hybrid drives, and it takes much longer than the CE
method. The final option is to conduct physical destruction, but since the scenario
states that the storage device will be reused, this is not a valid technique. Physical
destruction occurs by mechanical shredding, incineration, or degaussing magnetic
hard drives.

,CompTIA Security+ (SY0-601) DION
PRACTICE Exam 2024

Which of the following types of data breaches would require that the US
Department of Health and Human Services and the media be notified if more than
500 individuals are affected by a data breach?



Personally identifiable information

Trade secret information

Protected health information

Credit card information - Protected health information



Explanation

OBJ-4.5: Protected health information (PHI) is defined as any information that
identifies someone as the subject of medical and insurance records, plus their
associated hospital and laboratory test results. This type of data is protected by
the Health Insurance Portability and Accountability Act (HIPAA). It requires
notification of the individual, the Secretary of the US Department of Health and
Human Services (HHS), and the media (if more than 500 individuals are affected)
in the case of a data breach. Personally identifiable information (PII) is any data
that can be used to identify, contact, or impersonate an individual. Credit card
information is protected under the PCI DSS information security standard. Trade
secret information is protected by the organization that owns those secrets.

, CompTIA Security+ (SY0-601) DION
PRACTICE Exam 2024

A user has reported that their workstation is running very slowly. A technician
begins to investigate the issue and notices a lot of unknown processes running in
the background. The technician determines that the user has recently
downloaded a new application from the internet and may have become infected
with malware. Which of the following types of infections does the workstation
MOST likely have?



Ransomware

Rootkit

Keylogger

Trojan - Trojan



Explanation

OBJ-1.2: A trojan is a type of malware that looks legitimate but can take control of
your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict
some other harmful action on your data or network. The most common form of a
trojan is a Remote Access Trojan (RAT), which allows an attacker to control a
workstation or steal information remotely. To operate, a trojan will create
numerous processes that run in the background of the system. Ransomware is a
type of malware designed to deny access to a computer system or data until a

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ellah1 Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
88
Member since
2 year
Number of followers
63
Documents
2946
Last sold
3 months ago

I am a nurse and I know studying for exams can be really exhausting but with studying materials it tends to become much easier I have some guides that can make you an A student

4.4

18 reviews

5
13
4
2
3
2
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions