Search Header Logo

SYO-601 Practice Questions 42-82

Authored by Darrielle Flemming-Robinson

Instructional Technology

12th Grade

41 Questions

Used 5+ times

SYO-601 Practice Questions 42-82
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is tuning SIEM rules based off of threat intelligence

reports. Which of the following phases of the incident response process

does this scenario represent?

Eradication

Preparation

Lessons Learned

Recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network manager is concerned that business may be negatively

impacted if the firewall in its datacenter goes offline. The manager would

like to implement a high availability pair to:

decrease the mean time between failures

cut dawn the mean time to repair.

remove the single point of failure.

reduce the recovery time objective.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A host was infected with malware. During the incident response, Joe, a

user, reported that he did not receive any emails with links, but he had

been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?

The DNS logs

The SIP traffic logs

The web server logs

The SNMP logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would MOST likely be identified by a Points

credentialed scan but would be missed by an uncredentialed scan?

Vulnerabilities with a CVSS score greater than 6.9.

CVEs related to nan-Microsoft systems such as printers and switches.

Critical infrastructure vulnerabilities on non-lP protocols.

Missing patches for third-party software on Windows workstations and

servers.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent phishing campaign resulted in several compromised user

accounts. The security incident response team has been tasked with

reducing the manual labor ot filtering through all the phishing emails as

they arrive and blocking the sender's email address, along with other

time-consuming mitigation actions. Which of the following can be configured to streamline those tasks?

SOAR playbook

Firewall rules

MOM policy

URLfilter

SIEM data collection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a reason to publish files' hashes?

To validate the integrity af the files

To use the hash as a software activation ke

To verify if the software was digitally signed

To use the hash as a decryption passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is tasked with classifying data to be stored on company

servers. Which of the following should be classified as proprietary?

Customers dates af birth

Marketing strategies

Customers email addresses

Employee salaries

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?