Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 8 of 107
QUESTION 31

- (Exam Topic 5)
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:

  1. A. privilege escalation
  2. B. footprinting
  3. C. persistence
  4. D. pivoting.

Correct Answer: A

QUESTION 32

- (Exam Topic 4)
An organization has implemented a two-step verification process to protect user access to data that s stored in the coud Ic scssnncsitcibin a vdiemiietanebins code to access the data. Which of the following authentication methods did the organization implement?

  1. A. Token key
  2. B. B Static code
  3. C. Push notification
  4. D. HOTP

Correct Answer: A

QUESTION 33

- (Exam Topic 1)
A security analyst is evaluating solutions to deploy an additional layer of protection for a web application The goal is to allow only encrypted communications without relying on network devices Which of the following can be implemented?

  1. A. HTTP security header
  2. B. DNSSEC implementation
  3. C. SRTP
  4. D. S/MIME

Correct Answer: C

QUESTION 34

- (Exam Topic 1)
Which of the following is a benefit of including a risk management framework into an organization's security approach?

  1. A. It defines expected service levels from participating supply chain partners to ensure system outages are remediated in a timely manner
  2. B. It identifies specific vendor products that have been tested and approved for use in a secure environment.
  3. C. It provides legal assurances and remedies in the event a data breach occurs
  4. D. It incorporates control, development, policy, and management activities into IT operations.

Correct Answer: D

QUESTION 35

- (Exam Topic 1)
A security analyst has been asked by the Chief Information Security Officer to
• develop a secure method of providing centralized management of infrastructure
• reduce the need to constantly replace aging end user machines
• provide a consistent user desktop expenence
Which of the following BEST meets these requirements?

  1. A. BYOD
  2. B. Mobile device management
  3. C. VDI
  4. D. Containers ation

Correct Answer: C

Page 8 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: