
SYO-601 Domain 1 Practice Questions 1-30
Authored by Darrielle Flemming-Robinson
Instructional Technology
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately
protected from advanced threats and malware The CSO believes there is a high risk that
a data breach could occur in the near future due to the lack of detective and preventive
controls Which of the following should be implemented to BEST address the CSO's
concerns? {Select TWO)
AWAF
Containerization
An NG-SWG
Segmentation
ACASB
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a targeted attack aimed at compromising users within a
specific industry or group?
Watering hole
Typosquatting
Hoax
Impersonation
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the
organization’s executives determine the next course of action?
An incident response plan
A communication’s plan
A disaster recovery plan
A business continuity plan
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A major political party experienced a server breach. The hacker then publicly posted stolen intimal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?
Semi-authorized hackers
State actors
Script kiddies
Advanced persistent threats
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security analyst is reviewing application logs to determine the source of a breach and locates the following log:
https://www.comptia.com/login.php?id=’%20or%20’1’1=’1
Which Of the following has been observed?
DLL Injection
API attack
SQLI
XSS
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security Analyst was asked to investigate a situation after SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events at the left:
Based on the analyst findings, which of the following attacks is being executed?
credential harvesting
keylogger
brute-force
spraying
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A security analyst is performing a forensic investigation compromised account
credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of the following attacks is MOST likely being detected?
Pass-the-hash
Buffer overflow
Cross-site scripting
Session replay
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?