SYO-601 Update Exam With Complete Solutions Latest
Update 100% Pass
Which of the following may prevent vulnerabilities by avoiding code reuse?
A. Memory management
B. Stored procedures
C. Normalization
D. Code obfuscation - ANSWER Correct Answer: D
The Technology Department of a large international organization is implementing new
Wi-Fi network infrastructure in its corporate headquarters building. Which of the
following should be carefully coordinated between the technology, cybersecurity, and
physical security departments? Select 1
A. Authentication protocol
B. Encryption type
C. WAP placement
D. VPN configuration - ANSWER Correct Answer: C
Which of the following is an example of risk avoidance?
A. Doing security patch installations directly in production to speed up vulnerability
fixes
B. Purchasing insurance in anticipation of financial loss due to exploits
C. Avoiding the installation of new software to prevent compatibility errors
D. Not taking any preventive measure to avoid equipment theft - ANSWER Correct
Answer: C
A security administrator needs to deny a TCP connection using the corporate firewall.
Due to the possibility that this may be a malicious connection, the administrator does
,not want to return an RST. Based on the above scenario, which of the following below
action on the firewall rule would be the BEST?
A. Drop
B. Reject
C. Log alert
D. Permit - ANSWER Correct Answer: A
A security team discovers multiple organization-issued devices contain installed
non-work-related software. Which of the following
policies would MOST likely contain language that would prohibit this activity?
A. NDA
B. BPA
C. AUP
D. SLA - ANSWER Correct Answer: C
Which of the following BEST describes data streams that are compiled through artificial
intelligence that provides insight on current
cyberintrusions, phishing, and other malicious cyberactivity?
A. Intelligence fusion
B. Review reports
C. Log reviews
D. Threat feeds - ANSWER Correct Answer: D
This question requires the student to think critically about what would be the BEST
resource for a software developer who wants to enhance secure coding to prevent
vulnerabilities in web applications.
A. OWASP
B. Vulnerability scan results
C. NIST CSF
,D. Third-party libraries - ANSWER Correct Answer: A
Ann, a customer, was contacted by her mortgage company to say her PII may be shared
with partners, affiliates, and associates to
maintain day-to-day business operations. Which of the following documents did Ann
receive?
A. An annual privacy notice
B. A non-disclosure agreement
C. A privileged-user agreement
D. A memorandum of understanding - ANSWER Correct Answer: A
A Chief Information Security Officer (CISO) is examining the risks associated with
implementing a new ERP system for the organization. The CISO
classifies the system, identifies controls that must be applied to the system,
subsequently implements the controls, and finally evaluates the effectiveness of the
controls
before granting approval to the system. Which one of the following does the CISO make
use of to evaluate the environment for this new ERP system?
A. The Diamond Model of Intrusion Analysis
B. CIS Critical Security Controls
C. NIST Risk Management Framework
D. ISO 27002 - ANSWER Correct Answer: C
Chapter 10
322. A manufacturing company has a number of bespoke legacy information systems
that cannot be moved to a more modern OS because of software
compatibility issues. The OSs are still supported by the vendor, but the industrial
software is no longer supported. The Chief Information
Security Officer has created a resiliency plan for these systems that will allow OS
patches to be installed in a non-production environment,
while also creating backups of the systems for recovery. Which of the following
resiliency techniques will provide these capabilities?
, A. Redundancy
B. RAID 1+5
C. Virtual machines
D. Full backups - ANSWER Correct Answer: D Full backups
323. A retail store has a business need to deploy a kiosk computer in an open area. The
operating system on the kiosk computer has been
hardened and tested. A security engineer is concerned that someone could use
removable media to install a rootkit. Which of the following
should the security engineer configure to BEST protect the kiosk computer?
A. Measured boot
B. Boot attestation
C. UEFI
D. EDR - ANSWER Correct Answer: A Measured boot
A security engineer is tasked with reviewing the logs of a SAML application that utilizes
MFA. While reviewing the logs, the engineer notices a large number of successful logins
where MFA was not utilized by users while traveling abroad. This application is a type of
Without a VPN, accessed site allows time-based tokens to be created. Users who
change location are supposed to be forced to re-authenticate, but have successfully
been able to log in without being forced. Which of the following statements BEST
describes the problem?
A. OpenID must be necessary to facilitate the MFA requirements.
B. The SAML application recognizes an invalid browser.
C. A trusted certificate is installed on the access device that overrides the session
token.
D. The user's IP address changes between logons, but the application does not
invalidate the token. - ANSWER Correct Answer: D
An organization wants to enable native FDE for all of its laptop PCs. Which of the
following does the organization need to ensure is installed on all laptop PCs?
Update 100% Pass
Which of the following may prevent vulnerabilities by avoiding code reuse?
A. Memory management
B. Stored procedures
C. Normalization
D. Code obfuscation - ANSWER Correct Answer: D
The Technology Department of a large international organization is implementing new
Wi-Fi network infrastructure in its corporate headquarters building. Which of the
following should be carefully coordinated between the technology, cybersecurity, and
physical security departments? Select 1
A. Authentication protocol
B. Encryption type
C. WAP placement
D. VPN configuration - ANSWER Correct Answer: C
Which of the following is an example of risk avoidance?
A. Doing security patch installations directly in production to speed up vulnerability
fixes
B. Purchasing insurance in anticipation of financial loss due to exploits
C. Avoiding the installation of new software to prevent compatibility errors
D. Not taking any preventive measure to avoid equipment theft - ANSWER Correct
Answer: C
A security administrator needs to deny a TCP connection using the corporate firewall.
Due to the possibility that this may be a malicious connection, the administrator does
,not want to return an RST. Based on the above scenario, which of the following below
action on the firewall rule would be the BEST?
A. Drop
B. Reject
C. Log alert
D. Permit - ANSWER Correct Answer: A
A security team discovers multiple organization-issued devices contain installed
non-work-related software. Which of the following
policies would MOST likely contain language that would prohibit this activity?
A. NDA
B. BPA
C. AUP
D. SLA - ANSWER Correct Answer: C
Which of the following BEST describes data streams that are compiled through artificial
intelligence that provides insight on current
cyberintrusions, phishing, and other malicious cyberactivity?
A. Intelligence fusion
B. Review reports
C. Log reviews
D. Threat feeds - ANSWER Correct Answer: D
This question requires the student to think critically about what would be the BEST
resource for a software developer who wants to enhance secure coding to prevent
vulnerabilities in web applications.
A. OWASP
B. Vulnerability scan results
C. NIST CSF
,D. Third-party libraries - ANSWER Correct Answer: A
Ann, a customer, was contacted by her mortgage company to say her PII may be shared
with partners, affiliates, and associates to
maintain day-to-day business operations. Which of the following documents did Ann
receive?
A. An annual privacy notice
B. A non-disclosure agreement
C. A privileged-user agreement
D. A memorandum of understanding - ANSWER Correct Answer: A
A Chief Information Security Officer (CISO) is examining the risks associated with
implementing a new ERP system for the organization. The CISO
classifies the system, identifies controls that must be applied to the system,
subsequently implements the controls, and finally evaluates the effectiveness of the
controls
before granting approval to the system. Which one of the following does the CISO make
use of to evaluate the environment for this new ERP system?
A. The Diamond Model of Intrusion Analysis
B. CIS Critical Security Controls
C. NIST Risk Management Framework
D. ISO 27002 - ANSWER Correct Answer: C
Chapter 10
322. A manufacturing company has a number of bespoke legacy information systems
that cannot be moved to a more modern OS because of software
compatibility issues. The OSs are still supported by the vendor, but the industrial
software is no longer supported. The Chief Information
Security Officer has created a resiliency plan for these systems that will allow OS
patches to be installed in a non-production environment,
while also creating backups of the systems for recovery. Which of the following
resiliency techniques will provide these capabilities?
, A. Redundancy
B. RAID 1+5
C. Virtual machines
D. Full backups - ANSWER Correct Answer: D Full backups
323. A retail store has a business need to deploy a kiosk computer in an open area. The
operating system on the kiosk computer has been
hardened and tested. A security engineer is concerned that someone could use
removable media to install a rootkit. Which of the following
should the security engineer configure to BEST protect the kiosk computer?
A. Measured boot
B. Boot attestation
C. UEFI
D. EDR - ANSWER Correct Answer: A Measured boot
A security engineer is tasked with reviewing the logs of a SAML application that utilizes
MFA. While reviewing the logs, the engineer notices a large number of successful logins
where MFA was not utilized by users while traveling abroad. This application is a type of
Without a VPN, accessed site allows time-based tokens to be created. Users who
change location are supposed to be forced to re-authenticate, but have successfully
been able to log in without being forced. Which of the following statements BEST
describes the problem?
A. OpenID must be necessary to facilitate the MFA requirements.
B. The SAML application recognizes an invalid browser.
C. A trusted certificate is installed on the access device that overrides the session
token.
D. The user's IP address changes between logons, but the application does not
invalidate the token. - ANSWER Correct Answer: D
An organization wants to enable native FDE for all of its laptop PCs. Which of the
following does the organization need to ensure is installed on all laptop PCs?