SYO-601 Practice Questions 42-82

SYO-601 Practice Questions 42-82

12th Grade

41 Qs

quiz-placeholder

Similar activities

Legal and Ethical Issues

Legal and Ethical Issues

12th Grade

36 Qs

LV04 - Chassis revision

LV04 - Chassis revision

12th Grade

46 Qs

The Web

The Web

9th - 12th Grade

43 Qs

Level 2 Plumbing Central Heating

Level 2 Plumbing Central Heating

12th Grade

37 Qs

EMPOWERMENT TECHNOLOGY

EMPOWERMENT TECHNOLOGY

11th - 12th Grade

37 Qs

Sectional Charts

Sectional Charts

12th Grade

42 Qs

Intro General Shop Safety

Intro General Shop Safety

9th - 12th Grade

41 Qs

SYO-601 Practice Questions 42-82

SYO-601 Practice Questions 42-82

Assessment

Quiz

Instructional Technology

12th Grade

Medium

Created by

Darrielle Flemming-Robinson

Used 5+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is tuning SIEM rules based off of threat intelligence

reports. Which of the following phases of the incident response process

does this scenario represent?

Eradication

Preparation

Lessons Learned

Recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network manager is concerned that business may be negatively

impacted if the firewall in its datacenter goes offline. The manager would

like to implement a high availability pair to:

decrease the mean time between failures

cut dawn the mean time to repair.

remove the single point of failure.

reduce the recovery time objective.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A host was infected with malware. During the incident response, Joe, a

user, reported that he did not receive any emails with links, but he had

been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?

The DNS logs

The SIP traffic logs

The web server logs

The SNMP logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would MOST likely be identified by a Points

credentialed scan but would be missed by an uncredentialed scan?

Vulnerabilities with a CVSS score greater than 6.9.

CVEs related to nan-Microsoft systems such as printers and switches.

Critical infrastructure vulnerabilities on non-lP protocols.

Missing patches for third-party software on Windows workstations and

servers.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent phishing campaign resulted in several compromised user

accounts. The security incident response team has been tasked with

reducing the manual labor ot filtering through all the phishing emails as

they arrive and blocking the sender's email address, along with other

time-consuming mitigation actions. Which of the following can be configured to streamline those tasks?

SOAR playbook

Firewall rules

MOM policy

URLfilter

SIEM data collection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a reason to publish files' hashes?

To validate the integrity af the files

To use the hash as a software activation ke

To verify if the software was digitally signed

To use the hash as a decryption passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is tasked with classifying data to be stored on company

servers. Which of the following should be classified as proprietary?

Customers dates af birth

Marketing strategies

Customers email addresses

Employee salaries

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?