
SYO-601 Practice Questions 42-82
Authored by Darrielle Flemming-Robinson
Instructional Technology
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
41 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is tuning SIEM rules based off of threat intelligence
reports. Which of the following phases of the incident response process
does this scenario represent?
Eradication
Preparation
Lessons Learned
Recovery
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network manager is concerned that business may be negatively
impacted if the firewall in its datacenter goes offline. The manager would
like to implement a high availability pair to:
decrease the mean time between failures
cut dawn the mean time to repair.
remove the single point of failure.
reduce the recovery time objective.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A host was infected with malware. During the incident response, Joe, a
user, reported that he did not receive any emails with links, but he had
been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?
The DNS logs
The SIP traffic logs
The web server logs
The SNMP logs
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would MOST likely be identified by a Points
credentialed scan but would be missed by an uncredentialed scan?
Vulnerabilities with a CVSS score greater than 6.9.
CVEs related to nan-Microsoft systems such as printers and switches.
Critical infrastructure vulnerabilities on non-lP protocols.
Missing patches for third-party software on Windows workstations and
servers.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A recent phishing campaign resulted in several compromised user
accounts. The security incident response team has been tasked with
reducing the manual labor ot filtering through all the phishing emails as
they arrive and blocking the sender's email address, along with other
time-consuming mitigation actions. Which of the following can be configured to streamline those tasks?
SOAR playbook
Firewall rules
MOM policy
URLfilter
SIEM data collection
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a reason to publish files' hashes?
To validate the integrity af the files
To use the hash as a software activation ke
To verify if the software was digitally signed
To use the hash as a decryption passphrase
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security analyst is tasked with classifying data to be stored on company
servers. Which of the following should be classified as proprietary?
Customers dates af birth
Marketing strategies
Customers email addresses
Employee salaries
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?