최신 SY0-601 무료덤프 - CompTIA Security+

A network administrator added a new router to the network. Which of the following should the administrator do first when configuring the router?

정답: A
Which of the following describes software on network hardware that needs to be updated on a rou-tine basis to help address possible vulnerabilities?

정답: E
설명: (DumpTOP 회원만 볼 수 있음)
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

정답: D
The findings in a consultant's report indicate the most critical risk to the security posture from an incident response perspective is a lack of workstation and server investigation capabilities. Which of the following should be implemented to remediate this risk?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
The technology department at a large global company is expanding its Wi-Fi network infrastructure at the headquarters building Which of the following should be closely coordinated between the technology, cybersecurity, and physical security departments?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

정답: C
A security engineer learns that a non-critical application was compromised. The most recent version of the application includes a malicious reverse proxy while the application is running. Which of the following should the engineer is to quickly contain the incident with the least amount of impact?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following best describes configuring devices to log to a centralized, off-site location for possible future reference?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed?

정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a security implication of newer 1CS devices that are becoming more common in corporations?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following describes the exploitation of an interactive process to gain access to restricted areas?

정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A company wants to move one of its environments to the cloud. The biggest requirement is to have as much control as possible regarding the environment. Which of the following would most likely satisfy this requirement?

정답: D
A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device?

정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A Security engineer needs to implement an MDM solution that complies with the corporate mobile device policy. The policy states that in order for mobile users to access corporate resources on their devices, the following requirements must be met:
Mobile device OSs must be patched up to the latest release.
A screen lock must be enabled (passcode or biometric).
Corporate data must be removed if the device is reported lost or stolen.
Which of the following controls should the security engineer configure? (Select two).

정답: A,C
설명: (DumpTOP 회원만 볼 수 있음)
A security engineer is investigating a penetration test report that states the company website is vulnerable to a web application attack. While checking the web logs from the time of the test, the engineer notices several invalid web form submissions using an unusual address: "SELECT * FROM customername". Which of the following is most likely being attempted?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)
As part of a company's ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners. Which of the following will the company MOST likely implement?

정답: D
설명: (DumpTOP 회원만 볼 수 있음)

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기