SYO-601 Domain 1 Practice Questions 1-30

SYO-601 Domain 1 Practice Questions 1-30

12th Grade

20 Qs

quiz-placeholder

Similar activities

Problem solving VB.NET PREP 3 First chapter

Problem solving VB.NET PREP 3 First chapter

9th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

10th - 12th Grade

22 Qs

After Effects CC 2019 Quiz 1

After Effects CC 2019 Quiz 1

9th - 12th Grade

18 Qs

Setting up and using a circular table saw.

Setting up and using a circular table saw.

8th - 12th Grade

20 Qs

hardware

hardware

11th - 12th Grade

20 Qs

CPA Prelims JY 2022

CPA Prelims JY 2022

8th Grade - Professional Development

20 Qs

Welding safety

Welding safety

8th - 12th Grade

16 Qs

8.12 C++ Test on Classes

8.12 C++ Test on Classes

9th - 12th Grade

15 Qs

SYO-601 Domain 1 Practice Questions 1-30

SYO-601 Domain 1 Practice Questions 1-30

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

Darrielle Flemming-Robinson

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

A Chief Security Officer (CSO) is concerned that cloud-based services are not adequately

protected from advanced threats and malware The CSO believes there is a high risk that

a data breach could occur in the near future due to the lack of detective and preventive

controls Which of the following should be implemented to BEST address the CSO's

concerns? {Select TWO)

AWAF

Containerization

An NG-SWG

Segmentation

ACASB

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a targeted attack aimed at compromising users within a

specific industry or group?

Watering hole

Typosquatting

Hoax

Impersonation

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the

organization’s executives determine the next course of action?

An incident response plan

A communication’s plan

A disaster recovery plan

A business continuity plan

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A major political party experienced a server breach. The hacker then publicly posted stolen intimal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?

Semi-authorized hackers

State actors

Script kiddies

Advanced persistent threats

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst is reviewing application logs to determine the source of a breach and locates the following log:

https://www.comptia.com/login.php?id=’%20or%20’1’1=’1

Which Of the following has been observed?

DLL Injection

API attack

SQLI

XSS

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A security Analyst was asked to investigate a situation after SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events at the left:

Based on the analyst findings, which of the following attacks is being executed?

credential harvesting

keylogger

brute-force

spraying

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A security analyst is performing a forensic investigation compromised account

credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of the following attacks is MOST likely being detected?

Pass-the-hash

Buffer overflow

Cross-site scripting

Session replay

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?