A software developer would like to ensure the source code cannot be reverse engineered or debugged. Which of the following should the developer consider?
A. Version control
B. Obfuscation toolkit
C. Code reuse
D. Continuous integration
E. Stored procedures
Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?
A. Air gap
B. Barricade
C. Port security
D. Screened subnet
A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required for the security analysts. Which of the following would best enable the reduction in manual work?
A. SOAR
B. SIEM
C. MDM
D. DLP
Which of the following can a security director use to prioritize vulnerability patching within a company's IT environment?
A. SOAR
B. CVSS
C. SIEM
D. CVE
The Chief Information Security Officer wants to put security measures in place to protect PH. The organization needs to use its existing labeling and classification system to accomplish this goal. Which of the following would most likely be configured to meet the requirements?
A. Tokenization
B. S/MIME
C. DLP
D. MFA
A company wants to get alerts when others are researching and doing reconnaissance on the company. One approach would be to host a part of the infrastructure online with known vulnerabilities that would appear to be company assets. Which of the following describes this approach?
A. Watering hole
B. Bug bounty
C. DNS sinkhole
D. Honeypot
Which of the following is the final step of the incident response process?
A. Lessons learned
B. Eradication
C. Containment
D. Recovery
A systems administrator is redesigning how devices will perform network authentication. The following requirements need to be met:
? An existing internal certificate must be used.
? Wired and wireless networks must be supported.
? Any unapproved device should be isolated in a quarantine subnet.
? Approved devices should be updated before accessing resources.
Which of the following would best meet the requirements?
A. 802.1X
B. EAP
C. RADIUS
D. WPA2
An IT security team is concerned about the confidentiality of documents left unattended in MFPs. Which of the following should the security team do to mitigate the situation?
A. Educate users about the importance of paper shredder devices.
B. Deploy an authentication factor that requires in-person action before printing.
C. Install a software client in every computer authorized to use the MFPs.
D. Update the management software to utilize encryption.
Which of the following characteristics of tokenization explains how credit card information that is stored in a database is protected?
A. The fields are irreversible.
B. Symmetric algorithms are used.
C. Only authorized card holders have access.
D. The data is relabeled.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.