SY0-601 Dumps

SY0-601 Free Practice Test

CompTIA SY0-601: CompTIA Security+ Exam

QUESTION 181

- (Exam Topic 6)
A security administrator is seeking a solution to prevent unauthorized access to the internal network. Which of the following security solutions should the administrator choose?

Correct Answer: D
A VPN (virtual private network) is a secure tunnel used to encrypt traffic and prevent unauthorized access to the internal network. It is a secure way to extend a private network across public networks, such as the Internet, and can be used to allow remote users to securely access resources on the internal network. Additionally, a VPN can be used to prevent malicious traffic from entering the internal network.

QUESTION 182

- (Exam Topic 3)
An organidation recently discovered that a purchasing officer approved an invoice for an amount that was different than the original purchase order. After further investigation, a security analyst determines that the digital signature for the fraudulent invoice is exactly the same as the digital signature for the correct invoice that had been approved. Which of the following attacks MOST likely explains the behavior?

Correct Answer: C

QUESTION 183

- (Exam Topic 1)
A security proposal was set up to track requests for remote access by creating a baseline of the users' common sign-in properties. When a baseline deviation is detected, an Iv1FA challenge will be triggered. Which of the following should be configured in order to deploy the proposal?

Correct Answer: A
An access control scheme that verifies an object's identity based on various environmental factors, like time, location, and behavior.

QUESTION 184

- (Exam Topic 2)
While investigating a recent security incident, a security analyst decides to view all network connections on a particular server, Which of the following would provide the desired information?

Correct Answer: C

QUESTION 185

- (Exam Topic 4)
A Chief Security Officer (CSO) was notified that a customer was able to access confidential internal company files on a commonly used file-sharing service. The file-sharing service is the same one used by company staff as one of its approved third-party applications.
After further investigation, the security team determines the sharing of confidential files was accidental and not malicious. However, the CSO wants to implement changes to minimize this type of incident from reoccurring but does not want to impact existing business processes. Which of the following would BEST meet the CSO's objectives?

Correct Answer: A