A security analyst is working with a vendor to get a new SaaS application deployed to an enterprise. The analyst wants to ensure role-based security policies are correctly applied as users access the application. Which of the following is most likely to solve the issue?
A. CASB
B. AUP
C. NG-SWG
D. VPC endpoint
A municipality implements an IoT device discovery scanner and finds a legacy controller for a critical internal utility SCADA service that is running firmware with multiple vulnerabilities. Unfortunately, the controller cannot be upgraded, and a replacement for it is not available for at least a year. Which of the following is the best action to take to mitigate the risk posed by this controller in the meantime?
A. Isolate the controller from the rest of the network and constrain connectivity.
B. Remove the controller from the network altogether.
C. Quarantine the controller in a VLAN used for device patching from the internet.
D. Configure the internet firewall to deny any internet access to or from the controller.
Which of the following types of data are most likely to be subject to regulations and laws? (Choose two.)
A. PHI
B. Trade secrets
C. Proprietary
D. OSINT
E. PII
F. Public
An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?
A. Network
B. System
C. Application
D. Authentication
Which of the following, if compromised, can indirectly impact systems
An audit report showed that a former employee saved the following files to an external USB drive before the employee's termination date:
? annual_tax_form.pdf ? encrypted_passwords.db ? team_picture.jpg ? contact_list.db ? human_resources.txt
Which of the following could the former employee do to potentially compromise corporate credentials?
A. Perform an offline brute-force attack
B. Use the files to create a rainbow table.
C. Conduct a token replay.
D. Release a network dictionary attack.
Which of the following best describes a legal hold?
A. It occurs during litigation and requires retention of both electronic and physical documents.
B. It occurs during a risk assessment and requires retention of risk-related documents.
C. It occurs during incident recovery and requires retention of electronic documents.
D. It occurs during a business impact analysis and requires retention of documents categorized as personally identifiable information.
A company wants to move one of its environments to the cloud. The biggest requirement is to have as much control as possible regarding the environment. Which of the following would most likely satisfy this requirement?
A. SaaS
B. IaaS
C. PaaS
D. MaaS
A penetration test revealed that several Linux servers were misconfigured at the file level and access was granted incorrectly. A security analyst is referencing the instructions in the incident response runbook for remediation information. Which of the following is the best command to use to resolve the issue?
A. chmod
B. cat
C. grep
D. dig
Which of the following is the most important security concern when using legacy systems to provide production service?
A. Instability
B. Lack of vendor support
C. Loss of availability
D. Use of insecure protocols
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.