Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 16 of 107
QUESTION 71

- (Exam Topic 3)
Some laptops recently went missing from a locked storage area that is protected by keyless RFID-enabled locks. There is no obvious damage to the physical space. The security manager identifies who unlocked the door, however, human resources confirms the employee was on vacation at the time of the incident. Which of the following describes what MOST likely occurred?

  1. A. The employee's physical access card was cloned.
  2. B. The employee is colluding with human resources
  3. C. The employee's biometrics were harvested
  4. D. A criminal used lock picking tools to open the door.

Correct Answer: A

QUESTION 72

- (Exam Topic 2)
A penetration tester is fuzzing an application to identify where the EIP of the stack is located on memory. Which of the following attacks is the penetration tester planning to execute?

  1. A. Race-condition
  2. B. Pass-the-hash
  3. C. Buffer overflow
  4. D. XSS

Correct Answer: C

QUESTION 73

- (Exam Topic 1)
Which of the following would BEST provide a systems administrator with the ability to more efficiently identify systems and manage permissions and policies based on location, role, and service level?

  1. A. Standard naming conventions
  2. B. Domain services
  3. C. Baseline configurations
  4. D. Diagrams

Correct Answer: C

QUESTION 74

- (Exam Topic 3)
A security engineer needs to enhance MFA access to sensitive areas in a building. A key card and fingerprint scan are already in use. Which of the following would add another factor of authentication?

  1. A. Hard token
  2. B. Retina scan
  3. C. SMS text
  4. D. Keypad PIN

Correct Answer: B

QUESTION 75

- (Exam Topic 3)
A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner. Which of the following access control schemes BEST fits the requirements?

  1. A. Role-based access control
  2. B. Discretionary access control
  3. C. Mandatory access control
  4. D. Attribute-based access control

Correct Answer: B
Discretionary access control (DAC) is a model of access control based on access being determined "by the owner" of the resource in question. The owner of the resource can decide who does and does not have access, and exactly what access they are allowed to have.

Page 16 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: