Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 17 of 107
QUESTION 76

- (Exam Topic 3)
A cybersecurity administrator is using iptables as an enterprise firewall. The administrator created some rules, but the network now seems to be unresponsive All connections are being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

  1. A. # iptables -t mangle -X
  2. B. # iptables –F
  3. C. # iptables -Z
  4. D. # iptables -P INPUT -j DROP

Correct Answer: D

QUESTION 77

- (Exam Topic 3)
Which of the following describes the BEST approach for deploying application patches?

  1. A. Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.
  2. B. Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems
  3. C. Test the patches m a test environment apply them to the production systems and then apply them to a staging environment
  4. D. Apply the patches to the production systems apply them in a staging environment, and then test all of them in a testing environment

Correct Answer: A
https://oroinc.com/b2b-ecommerce/blog/testing-and-staging-environments-in-ecommerce-implementation/

QUESTION 78

- (Exam Topic 3)
Joe, a user at a company, clicked an email link led to a website that infected his workstation. Joe, was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and It has continues to evade detection. Which of the following should administrator implement to protect the environment from this malware?

  1. A. Install a definition-based antivirus.
  2. B. Implement an IDS/IPS
  3. C. Implement a heuristic behavior-detection solution.
  4. D. Implement CASB to protect the network shares.

Correct Answer: C
Heuristic analysis is also one of the few methods capable of combating polymorphic viruses — the term for malicious code that constantly changes and adapts. Heuristic analysis is incorporated into advanced security solutions offered by companies like Kaspersky Labs to detect new threats before they cause harm, without the need for a specific signature. https://usa.kaspersky.com/resource-center/definitions/heuristic-analysis

QUESTION 79

- (Exam Topic 5)
When planning to build a virtual environment, an administrator need to achieve the following,
•Establish polices in Limit who can create new VMs
•Allocate resources according to actual utilization‘
•Require justication for requests outside of the standard requirements.
•Create standardized categories based on size and resource requirements
Which of the following is the administrator MOST likely trying to do?

  1. A. Implement IaaS replication
  2. B. Product against VM escape
  3. C. Deploy a PaaS
  4. D. Avoid VM sprawl

Correct Answer: D

QUESTION 80

- (Exam Topic 5)
A scurity analyst must enforce policies to harden an MDM infrastructure. The requirements are as follows:
* Ensure mobile devices can be tracked and wiped.
* Confirm mobile devices are encrypted.
Which of the following should the analyst enable on all the devices to meet these requirements?

  1. A. A Geofencing
  2. B. Biometric authentication
  3. C. Geolocation
  4. D. Geotagging

Correct Answer: A

Page 17 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: