Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 27 of 107
QUESTION 126

- (Exam Topic 5)
A cybersecurity administrator needs to allow mobile BYOD devices to access network resources. As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).

  1. A. Create a new network for the mobile devices and block the communication to the internal network and servers
  2. B. Use a captive portal for user authentication.
  3. C. Authenticate users using OAuth for more resiliency
  4. D. Implement SSO and allow communication to the internal network
  5. E. Use the existing network and allow communication to the internal network and servers.
  6. F. Use a new and updated RADIUS server to maintain the best solution

Correct Answer: BC

QUESTION 127

- (Exam Topic 1)
A security engineer was assigned to implement a solution to prevent attackers from gaining access by pretending to be authorized users. Which of the following technologies meets the requirement?

  1. A. SSO
  2. B. IDS
  3. C. MFA
  4. D. TPM

Correct Answer: C

QUESTION 128

- (Exam Topic 4)
A major palitical party experienced a server breach. The hacker then publicly posted stolen intemal cammunications compeming campaign strategies to give the oppasitian party an advantage. Which of the following BEST describes these threat actors?

  1. A. Semi-aulhorized hackers
  2. B. State actors
  3. C. Script kiddies
  4. D. Advanced persistent threats

Correct Answer: B

QUESTION 129

- (Exam Topic 5)
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?

  1. A. Preventive
  2. B. Compensating
  3. C. Corrective
  4. D. Detective

Correct Answer: D

QUESTION 130

- (Exam Topic 4)
A SOC is implementing an insider-threat-detection program. The primary concern is that users may be accessing confidential data without authorization. Which of the following should be deployed to detect a potential insider threat?

  1. A. honeyfile
  2. B. ADMZ
  3. C. DLP
  4. D. File integrity monitoring

Correct Answer: A

Page 27 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: