100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

SY0-601 Study test questions and answers

Beoordeling
-
Verkocht
-
Pagina's
20
Cijfer
A+
Geüpload op
20-12-2024
Geschreven in
2024/2025

SY0-601 Study test questions and answers

Instelling
SY0-601
Vak
SY0-601










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
SY0-601
Vak
SY0-601

Documentinformatie

Geüpload op
20 december 2024
Aantal pagina's
20
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SY0-601 Study test questions and
answers 2024-2025
A Certificate Revocation List (CRL) has a publish period set to 24 hours. Based on the
normal procedures for a CRL, what is the most applicable validity period for this
certificate? - ANSWER-*26 hours*

1 hour

23 hours

72 hours

A client contacts a server for a data transfer. Instead of requesting TLS1.3
authentication, the client claims legacy systems require the use of SSL. What type of
attack might a data transfer using this protocol facilitate? - ANSWER-Credential
harvesting

Key stretching

Phishing

*Man-in-the-middle*

A company has a critical encryption key that has an M-of-N control configuration for
protection. Examine the examples and select the one that correctly illustrates the proper
configuration for this type of protection of critical encryption keys. - ANSWER-M=1 and
N=5
*M=3 and N=5*
M=6 and N=5
M=0 and N=5

A company has an annual contract with an outside firm to perform a security audit on
their network. The purpose of the annual audit is to determine if the company is in
compliance with their internal directives and policies for security control. What broad
class of security control that accurately demonstrates the purpose of the audit? -
ANSWER-*Managerial*

Technical

Physical

Compensating

,A company technician goes on vacation. While the technician is away, a critical patch
released for Windows servers is not applied. According to the National Institute of
Standards and Technology (NIST), what does the delay in applying the patch create on
the server? - ANSWER-Control

Risk

Threat

*Vulnerability*

A contractor has been hired to conduct penetration testing on a company's network.
They have decided to try to crack the passwords on a percentage of systems within the
company. They plan to annotate the type of data that is on the systems that they can
successfully crack to prove the ease of access to data. Evaluate the penetration steps
and determine which are being utilized for this task. (Select all that apply.) - ANSWER-
*Test security controls*

Bypass security controls

Verify a threat exists

*Exploit vulnerabilities*

A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds their
Facebook pages. Posts found on Facebook indicate a favorite bar that employees
frequent. The contractor visits the bar and learns details of the company's security
infrastructure through small talk. What reconnaissance phase techniques does the
contractor practice? (Select all that apply.) - ANSWER-*Open Source Intelligence
(OSINT)*

Scanning

*Social engineering*

Persistence

A Department of Defense (DoD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other government
agencies to use. The team will transmit threat data feed via which protocol? - ANSWER-
Structured Threat Information eXpression (STIX)

Automated Indicator Sharing (AIS)

, *Trusted Automated eXchange of Indicator Information (TAXII)*

A code repository protocol

A gaming company decides to add software on each title it releases. The company's
objective is to require the CD to be inserted during use. This software will gain
administrative rights, change system files, and hide from detection without the
knowledge or consent of the user. Consider the malware characteristics and determine
which is being used. - ANSWER-Spyware

Keylogger

*Rootkit*

Trojan

A hacker is able to install a keylogger on a user's computer. What is the hacker
attempting to do in this situation? - ANSWER-Key management

Encryption

Obfuscation

*Steal confidential information*

A hacker set up a Command and Control network to control a compromised host. What
is the ability of the hacker to use this remote connection method as needed known as? -
ANSWER-Weaponization

*Persistence*

Reconnaissance

Pivoting

A hospital must balance the need to keep patient privacy information secure and the
desire to analyze the contents of patient records for a scientific study. What
cryptographic technology can best support the hospital's needs? - ANSWER-Blockchain

Quantum computing is not yet sufficiently secure to run current cryptographic ciphers.

Perfect forward security (PFS)

Homomorphic encryption

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
CLOUND Exam
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
603
Lid sinds
2 jaar
Aantal volgers
389
Documenten
10901
Laatst verkocht
1 week geleden
PROF MM

HELLO WELCOME TO THIS PAGE WHERE YOU WILL FIND ALL EXAMS ,STUDY GUIDE ,CASE, TESTBANKS AND ANY OTHER STUDY MATERIALS,

3,9

116 beoordelingen

5
58
4
16
3
29
2
3
1
10

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen