Which of the following security controls is used to isolate a section of the network and its externally available resources from the internal corporate network in order to reduce the number of possible attacks?
A. Faraday cages
B. Air gap
C. Vaulting
D. Proximity readers
A security analyst is responding to a malware incident at a company. The malware connects to a command-and-control server on the internet in order to function. Which of the following should the security analyst implement first?
A. Network segmentation
B. IP-based firewall rules
C. Mobile device management
D. Content filler
An accounting intern receives an invoice via email from the Chief Executive Officer (CEO). In the email, the CEO demands the immediate release of funds to the bank account that is listed. Which of the following principles best describes why this attack might be successful?
A. Authority
B. Scarcity
C. Consensus
D. Familiarity
An accounting intern receives an invoice via email from the Chief Executive Officer (CEO). In the email, the CEO demands the immediate release of funds to the bank account that is listed. Which of the following principles best describes why this attack might be successful?
A. Authority
B. Scarcity
C. Consensus
D. Familiarity
A user downloaded software from an online forum. After the user installed the software, the security team observed external network traffic connecting to the user's computer on an uncommon port. Which of the following is the most likely explanation of this unauthorized connection?
A. The software had a hidden keylogger.
B. The software was ransomware.
C. The user's computer had a fileless virus.
D. The software contained a backdoor.
During a penetration test, a flaw in the internal PKI was exploited to gain domain administrator rights using specially crafted certificates. Which of the following remediation tasks should be completed as part of the cleanup phase?
A. Updating the CRL
B. Patching the CA
C. Changing passwords
D. Implementing SOAR
An organization recently experienced the following social engineering attacks that introduced malware into the network:
? In the first attack, the sender impersonated a staff member in the legal department and sent an email stating that the employee needed to click a link to sign an NDA in order to remain employed. The link provided was to a malicious website. ? In the second attack, the sender impersonated the director of finance and instructed the accounts payable department to pay an outstanding invoice. The attached invoice contained malware.
Which of the following is the most likely reason these attacks were successful?
A. Both attacks passed the spam filters, which resulted in the end users thinking the emails were legitimate.
B. Both attacks concealed the delivery of malware, which led end users to trust the emails.
C. Both attacks appealed to authority, which made the end users feel obligated to perform the requested actions.
D. Both attacks relied on dumpster diving to obtain a list of valid contacts to receive the malicious emails.
Which of the following security program audits includes a comprehensive evaluation of the security controls in place at an organization over a six- to 12-month time period?
A. NIST CSF
B. SOC 2 Type II
C. ISO 27001
D. PCI DSS
Development team members set up multiple application environments so they can develop, test, and deploy code in a secure and reliable manner. One of the environments is configured with real data that has been obfuscated so the team can adequately assess how the code will work in production. Which of the following environments is set up?
A. Quality assurance
B. Development
C. Sandbox
D. Production
Which of the following provides guidelines for the management and reduction of information security risk?
A. CIS
B. NIST CSF
C. ISO
D. PCI DSS
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.