SYO-601 Practice Questions 42-82

SYO-601 Practice Questions 42-82

12th Grade

41 Qs

quiz-placeholder

Similar activities

Final Summative in EmpTech

Final Summative in EmpTech

11th - 12th Grade

40 Qs

Aviation Regulations Quiz

Aviation Regulations Quiz

12th Grade - University

36 Qs

T-Levels Computer and Data Security

T-Levels Computer and Data Security

12th Grade

41 Qs

webMethod Final Review Session

webMethod Final Review Session

7th - 12th Grade

36 Qs

Officers - PPTQ 47

Officers - PPTQ 47

12th Grade

40 Qs

Peripheral Devices Review

Peripheral Devices Review

9th Grade - University

40 Qs

Module 3-4 ICT QUIZ

Module 3-4 ICT QUIZ

12th Grade - University

36 Qs

Midterm Exam Review

Midterm Exam Review

12th Grade

36 Qs

SYO-601 Practice Questions 42-82

SYO-601 Practice Questions 42-82

Assessment

Quiz

Instructional Technology

12th Grade

Medium

Created by

Darrielle Flemming-Robinson

Used 5+ times

FREE Resource

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is tuning SIEM rules based off of threat intelligence

reports. Which of the following phases of the incident response process

does this scenario represent?

Eradication

Preparation

Lessons Learned

Recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network manager is concerned that business may be negatively

impacted if the firewall in its datacenter goes offline. The manager would

like to implement a high availability pair to:

decrease the mean time between failures

cut dawn the mean time to repair.

remove the single point of failure.

reduce the recovery time objective.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A host was infected with malware. During the incident response, Joe, a

user, reported that he did not receive any emails with links, but he had

been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?

The DNS logs

The SIP traffic logs

The web server logs

The SNMP logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would MOST likely be identified by a Points

credentialed scan but would be missed by an uncredentialed scan?

Vulnerabilities with a CVSS score greater than 6.9.

CVEs related to nan-Microsoft systems such as printers and switches.

Critical infrastructure vulnerabilities on non-lP protocols.

Missing patches for third-party software on Windows workstations and

servers.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent phishing campaign resulted in several compromised user

accounts. The security incident response team has been tasked with

reducing the manual labor ot filtering through all the phishing emails as

they arrive and blocking the sender's email address, along with other

time-consuming mitigation actions. Which of the following can be configured to streamline those tasks?

SOAR playbook

Firewall rules

MOM policy

URLfilter

SIEM data collection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a reason to publish files' hashes?

To validate the integrity af the files

To use the hash as a software activation ke

To verify if the software was digitally signed

To use the hash as a decryption passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is tasked with classifying data to be stored on company

servers. Which of the following should be classified as proprietary?

Customers dates af birth

Marketing strategies

Customers email addresses

Employee salaries

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?