Search Header Logo

SYO-601 Domain 1 Practice Questions 1-30

Authored by Darrielle Flemming-Robinson

Instructional Technology

12th Grade

Used 4+ times

SYO-601 Domain 1 Practice Questions 1-30
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately

protected from advanced threats and malware The CSO believes there is a high risk that

a data breach could occur in the near future due to the lack of detective and preventive

controls Which of the following should be implemented to BEST address the CSO's

concerns? {Select TWO)

AWAF

Containerization

An NG-SWG

Segmentation

ACASB

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a targeted attack aimed at compromising users within a

specific industry or group?

Watering hole

Typosquatting

Hoax

Impersonation

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the

organization’s executives determine the next course of action?

An incident response plan

A communication’s plan

A disaster recovery plan

A business continuity plan

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A major political party experienced a server breach. The hacker then publicly posted stolen intimal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?

Semi-authorized hackers

State actors

Script kiddies

Advanced persistent threats

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst is reviewing application logs to determine the source of a breach and locates the following log:

https://www.comptia.com/login.php?id=’%20or%20’1’1=’1

Which Of the following has been observed?

DLL Injection

API attack

SQLI

XSS

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A security Analyst was asked to investigate a situation after SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events at the left:

Based on the analyst findings, which of the following attacks is being executed?

credential harvesting

keylogger

brute-force

spraying

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst is performing a forensic investigation compromised account

credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of the following attacks is MOST likely being detected?

Pass-the-hash

Buffer overflow

Cross-site scripting

Session replay

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology