Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 12 of 107
QUESTION 51

- (Exam Topic 5)
The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?

  1. A. Requiring all new, on-site visitors to configure their devices to use WPS
  2. B. Implementing a new SSID for every event hosted by the college that has visitors
  3. C. Creating a unique PSK for every visitor when they arrive at the reception area
  4. D. Deploying a captive portal to capture visitors' MAC addresses and names

Correct Answer: D

QUESTION 52

- (Exam Topic 6)
A security analyst has been tasked with creating a new WiFi network for the company. The requirements received by the analyst are as follows:
•Must be able to differentiate between users connected to WiFi
•The encryption keys need to change routinely without interrupting the users or forcing reauthentication
•Must be able to integrate with RADIUS
•Must not have any open SSIDs
Which of the following options BEST accommodates these requirements?

  1. A. WPA2-Enterprise
  2. B. WPA3-PSK
  3. C. 802.11n
  4. D. WPS

Correct Answer: A

QUESTION 53

- (Exam Topic 5)
A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet. The following output was captured on an internal host:
SY0-601 dumps exhibit
Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?

  1. A. Denial of service
  2. B. ARP poisoning
  3. C. Command injection
  4. D. MAC flooding

Correct Answer: D

QUESTION 54

- (Exam Topic 2)
A company discovered that terabytes of data have been exfiltrated over the past year after an employee clicked on an email link. The threat continued to evolve and remain undetected until a security analyst noticed an abnormal amount of external connections when the employee was not working. Which of the following is the MOST likely threat actor?

  1. A. Shadow IT
  2. B. Script kiddies
  3. C. APT
  4. D. Insider threat

Correct Answer: C
An APT attack is characterized by using toolkits to achieve a presence on a target network and then, instead of just moving to steal information, focusing on the long game by maintaining a persistent presence on the target network. The tactics, tools, and procedures of APTs are focused on maintaining administrative access to the target network and avoiding detection. Then, over the long haul, the attacker can remove intellectual property and more from the organization, typically undetected.

QUESTION 55

- (Exam Topic 3)
A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?

  1. A. MTBF
  2. B. RPO
  3. C. RTO
  4. D. MTTR

Correct Answer: C

Page 12 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: