100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SY0-601 Study test questions and answers

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
20-12-2024
Written in
2024/2025

SY0-601 Study test questions and answers

Institution
SY0-601
Course
SY0-601










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SY0-601
Course
SY0-601

Document information

Uploaded on
December 20, 2024
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SY0-601 Study test questions and
answers 2024-2025
A Certificate Revocation List (CRL) has a publish period set to 24 hours. Based on the
normal procedures for a CRL, what is the most applicable validity period for this
certificate? - ANSWER-*26 hours*

1 hour

23 hours

72 hours

A client contacts a server for a data transfer. Instead of requesting TLS1.3
authentication, the client claims legacy systems require the use of SSL. What type of
attack might a data transfer using this protocol facilitate? - ANSWER-Credential
harvesting

Key stretching

Phishing

*Man-in-the-middle*

A company has a critical encryption key that has an M-of-N control configuration for
protection. Examine the examples and select the one that correctly illustrates the proper
configuration for this type of protection of critical encryption keys. - ANSWER-M=1 and
N=5
*M=3 and N=5*
M=6 and N=5
M=0 and N=5

A company has an annual contract with an outside firm to perform a security audit on
their network. The purpose of the annual audit is to determine if the company is in
compliance with their internal directives and policies for security control. What broad
class of security control that accurately demonstrates the purpose of the audit? -
ANSWER-*Managerial*

Technical

Physical

Compensating

,A company technician goes on vacation. While the technician is away, a critical patch
released for Windows servers is not applied. According to the National Institute of
Standards and Technology (NIST), what does the delay in applying the patch create on
the server? - ANSWER-Control

Risk

Threat

*Vulnerability*

A contractor has been hired to conduct penetration testing on a company's network.
They have decided to try to crack the passwords on a percentage of systems within the
company. They plan to annotate the type of data that is on the systems that they can
successfully crack to prove the ease of access to data. Evaluate the penetration steps
and determine which are being utilized for this task. (Select all that apply.) - ANSWER-
*Test security controls*

Bypass security controls

Verify a threat exists

*Exploit vulnerabilities*

A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds their
Facebook pages. Posts found on Facebook indicate a favorite bar that employees
frequent. The contractor visits the bar and learns details of the company's security
infrastructure through small talk. What reconnaissance phase techniques does the
contractor practice? (Select all that apply.) - ANSWER-*Open Source Intelligence
(OSINT)*

Scanning

*Social engineering*

Persistence

A Department of Defense (DoD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other government
agencies to use. The team will transmit threat data feed via which protocol? - ANSWER-
Structured Threat Information eXpression (STIX)

Automated Indicator Sharing (AIS)

, *Trusted Automated eXchange of Indicator Information (TAXII)*

A code repository protocol

A gaming company decides to add software on each title it releases. The company's
objective is to require the CD to be inserted during use. This software will gain
administrative rights, change system files, and hide from detection without the
knowledge or consent of the user. Consider the malware characteristics and determine
which is being used. - ANSWER-Spyware

Keylogger

*Rootkit*

Trojan

A hacker is able to install a keylogger on a user's computer. What is the hacker
attempting to do in this situation? - ANSWER-Key management

Encryption

Obfuscation

*Steal confidential information*

A hacker set up a Command and Control network to control a compromised host. What
is the ability of the hacker to use this remote connection method as needed known as? -
ANSWER-Weaponization

*Persistence*

Reconnaissance

Pivoting

A hospital must balance the need to keep patient privacy information secure and the
desire to analyze the contents of patient records for a scientific study. What
cryptographic technology can best support the hospital's needs? - ANSWER-Blockchain

Quantum computing is not yet sufficiently secure to run current cryptographic ciphers.

Perfect forward security (PFS)

Homomorphic encryption

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CLOUND Exam
View profile
Follow You need to be logged in order to follow users or courses
Sold
603
Member since
2 year
Number of followers
389
Documents
10901
Last sold
1 week ago
PROF MM

HELLO WELCOME TO THIS PAGE WHERE YOU WILL FIND ALL EXAMS ,STUDY GUIDE ,CASE, TESTBANKS AND ANY OTHER STUDY MATERIALS,

3.9

116 reviews

5
58
4
16
3
29
2
3
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions