Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

SY0-601 Study test questions and answers

Note
-
Vendu
-
Pages
20
Qualité
A+
Publié le
20-12-2024
Écrit en
2024/2025

SY0-601 Study test questions and answers

Établissement
SY0-601
Cours
SY0-601










Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
SY0-601
Cours
SY0-601

Infos sur le Document

Publié le
20 décembre 2024
Nombre de pages
20
Écrit en
2024/2025
Type
Examen
Contenu
Questions et réponses

Sujets

Aperçu du contenu

SY0-601 Study test questions and
answers 2024-2025
A Certificate Revocation List (CRL) has a publish period set to 24 hours. Based on the
normal procedures for a CRL, what is the most applicable validity period for this
certificate? - ANSWER-*26 hours*

1 hour

23 hours

72 hours

A client contacts a server for a data transfer. Instead of requesting TLS1.3
authentication, the client claims legacy systems require the use of SSL. What type of
attack might a data transfer using this protocol facilitate? - ANSWER-Credential
harvesting

Key stretching

Phishing

*Man-in-the-middle*

A company has a critical encryption key that has an M-of-N control configuration for
protection. Examine the examples and select the one that correctly illustrates the proper
configuration for this type of protection of critical encryption keys. - ANSWER-M=1 and
N=5
*M=3 and N=5*
M=6 and N=5
M=0 and N=5

A company has an annual contract with an outside firm to perform a security audit on
their network. The purpose of the annual audit is to determine if the company is in
compliance with their internal directives and policies for security control. What broad
class of security control that accurately demonstrates the purpose of the audit? -
ANSWER-*Managerial*

Technical

Physical

Compensating

,A company technician goes on vacation. While the technician is away, a critical patch
released for Windows servers is not applied. According to the National Institute of
Standards and Technology (NIST), what does the delay in applying the patch create on
the server? - ANSWER-Control

Risk

Threat

*Vulnerability*

A contractor has been hired to conduct penetration testing on a company's network.
They have decided to try to crack the passwords on a percentage of systems within the
company. They plan to annotate the type of data that is on the systems that they can
successfully crack to prove the ease of access to data. Evaluate the penetration steps
and determine which are being utilized for this task. (Select all that apply.) - ANSWER-
*Test security controls*

Bypass security controls

Verify a threat exists

*Exploit vulnerabilities*

A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds their
Facebook pages. Posts found on Facebook indicate a favorite bar that employees
frequent. The contractor visits the bar and learns details of the company's security
infrastructure through small talk. What reconnaissance phase techniques does the
contractor practice? (Select all that apply.) - ANSWER-*Open Source Intelligence
(OSINT)*

Scanning

*Social engineering*

Persistence

A Department of Defense (DoD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other government
agencies to use. The team will transmit threat data feed via which protocol? - ANSWER-
Structured Threat Information eXpression (STIX)

Automated Indicator Sharing (AIS)

, *Trusted Automated eXchange of Indicator Information (TAXII)*

A code repository protocol

A gaming company decides to add software on each title it releases. The company's
objective is to require the CD to be inserted during use. This software will gain
administrative rights, change system files, and hide from detection without the
knowledge or consent of the user. Consider the malware characteristics and determine
which is being used. - ANSWER-Spyware

Keylogger

*Rootkit*

Trojan

A hacker is able to install a keylogger on a user's computer. What is the hacker
attempting to do in this situation? - ANSWER-Key management

Encryption

Obfuscation

*Steal confidential information*

A hacker set up a Command and Control network to control a compromised host. What
is the ability of the hacker to use this remote connection method as needed known as? -
ANSWER-Weaponization

*Persistence*

Reconnaissance

Pivoting

A hospital must balance the need to keep patient privacy information secure and the
desire to analyze the contents of patient records for a scientific study. What
cryptographic technology can best support the hospital's needs? - ANSWER-Blockchain

Quantum computing is not yet sufficiently secure to run current cryptographic ciphers.

Perfect forward security (PFS)

Homomorphic encryption
10,49 €
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
CLOUND Exam
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
603
Membre depuis
2 année
Nombre de followers
389
Documents
10901
Dernière vente
1 semaine de cela
PROF MM

HELLO WELCOME TO THIS PAGE WHERE YOU WILL FIND ALL EXAMS ,STUDY GUIDE ,CASE, TESTBANKS AND ANY OTHER STUDY MATERIALS,

3,9

116 revues

5
58
4
16
3
29
2
3
1
10

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions