Security+ SYO-601 General Exam Questions And 100%
Correct Answers A+ Graded
Which of the following should be the NEXT step that the client should take to mitigate the
issue?
A. A full vulnerability scan shall be performed to identify potential vulnerabilities.
B. Containment shall be performed on the critical servers and resources.
C. Reviewing the firewall and identifying the source of the active connection.
D. Disconnect the whole infrastructure from the internet.
Detective controls
A security analyst has been requested to implement controls necessary to prevent
unauthorized access to a physical facility. She is under mandate to use the least
expensive budget feasible.
Which of the following would MOST effectively meet the needs?
A. Preventive controls
B. Compensating controls
C. Deterrent controls
D. Detective controls
SaaS
An organization wants to reduce its technology fingerprint by moving some of its
servers to the cloud. It currently maintains 100 on-premise databases.
,Which of the following solutions will require the LEAST management and support from
the company?
A. SaaS
B. IaaS
C. PaaS
D. SDN
DPO
Which of the following employee roles is responsible for protecting an organization's
collected personal information?
A. CTO
B. DPO
C. CEO
D. DBA
Salting
Against the advice of their IT security analyst, a firm set all user passwords on a server
to `P@55w0rD`. An attacker, upon examining the /etc/passwd file, found the following:
alice:a8df3b6c4fd75f0617431fd248f35191df8d237f
bob:2d250c5b2976b03d757f324ebd59340df96aa05e
chris:ea981ec3285421d014108089f3f3f997ce0f4150
Which of the following BEST explains why the hashed passwords do not match?
,A. Perfect forward secrecy
B. Key stretching
C. Salting
D. Hashing
pivoting.
A penetration tester uses a weakness in the device's firmware to exploit a vulnerability
on a dual-homed and multifunctional device that has both wired and wireless access.
Then he proceeds to get shell access on another asset that is networked.
This technique is an example of:
A. privilege escalation.
B. footprinting.
C. persistence.
D. pivoting.
Dark web
Which of the following would a threat intelligence researcher that is looking for leaked
credentials want to monitor?
A. Common Weakness Enumeration
B. OSINT
C. Dark web
D. Vulnerability databases
SIEM
, As a security analyst, the ability to search and correlate logs from multiple sources must
be provided within one tool.
Which of the following would BEST provide this ability to the security analyst?
A. SOAR
B. SIEM
C. Log collectors
D. Network-attached storage
SQLi attack
An enterprise security analyst needs to examine suspicious traffic to the web server at
IP address 10.10.1.1. He searches the WAF logs and finds the following output:
Requested URL
contains a 1=1-- at the end of the URL.
Which of the following is MOST likely happening?
A. XSS attack
B. SQLi attack
C. Replay attack
D. XSRF attack
Transit gateway
Which of the following components can be used to consolidate and forward inbound
internet traffic to various cloud environments though a single firewall?
Correct Answers A+ Graded
Which of the following should be the NEXT step that the client should take to mitigate the
issue?
A. A full vulnerability scan shall be performed to identify potential vulnerabilities.
B. Containment shall be performed on the critical servers and resources.
C. Reviewing the firewall and identifying the source of the active connection.
D. Disconnect the whole infrastructure from the internet.
Detective controls
A security analyst has been requested to implement controls necessary to prevent
unauthorized access to a physical facility. She is under mandate to use the least
expensive budget feasible.
Which of the following would MOST effectively meet the needs?
A. Preventive controls
B. Compensating controls
C. Deterrent controls
D. Detective controls
SaaS
An organization wants to reduce its technology fingerprint by moving some of its
servers to the cloud. It currently maintains 100 on-premise databases.
,Which of the following solutions will require the LEAST management and support from
the company?
A. SaaS
B. IaaS
C. PaaS
D. SDN
DPO
Which of the following employee roles is responsible for protecting an organization's
collected personal information?
A. CTO
B. DPO
C. CEO
D. DBA
Salting
Against the advice of their IT security analyst, a firm set all user passwords on a server
to `P@55w0rD`. An attacker, upon examining the /etc/passwd file, found the following:
alice:a8df3b6c4fd75f0617431fd248f35191df8d237f
bob:2d250c5b2976b03d757f324ebd59340df96aa05e
chris:ea981ec3285421d014108089f3f3f997ce0f4150
Which of the following BEST explains why the hashed passwords do not match?
,A. Perfect forward secrecy
B. Key stretching
C. Salting
D. Hashing
pivoting.
A penetration tester uses a weakness in the device's firmware to exploit a vulnerability
on a dual-homed and multifunctional device that has both wired and wireless access.
Then he proceeds to get shell access on another asset that is networked.
This technique is an example of:
A. privilege escalation.
B. footprinting.
C. persistence.
D. pivoting.
Dark web
Which of the following would a threat intelligence researcher that is looking for leaked
credentials want to monitor?
A. Common Weakness Enumeration
B. OSINT
C. Dark web
D. Vulnerability databases
SIEM
, As a security analyst, the ability to search and correlate logs from multiple sources must
be provided within one tool.
Which of the following would BEST provide this ability to the security analyst?
A. SOAR
B. SIEM
C. Log collectors
D. Network-attached storage
SQLi attack
An enterprise security analyst needs to examine suspicious traffic to the web server at
IP address 10.10.1.1. He searches the WAF logs and finds the following output:
Requested URL
contains a 1=1-- at the end of the URL.
Which of the following is MOST likely happening?
A. XSS attack
B. SQLi attack
C. Replay attack
D. XSRF attack
Transit gateway
Which of the following components can be used to consolidate and forward inbound
internet traffic to various cloud environments though a single firewall?