SYO-601 Practice Questions 42-82

SYO-601 Practice Questions 42-82

12th Grade

41 Qs

quiz-placeholder

Similar activities

webMethod Final Review Session

webMethod Final Review Session

7th - 12th Grade

36 Qs

Network Security Quiz

Network Security Quiz

9th Grade - University

45 Qs

Fourth Examination in Empowerment of Technology

Fourth Examination in Empowerment of Technology

12th Grade

40 Qs

Peripheral Devices Review

Peripheral Devices Review

9th Grade - University

40 Qs

Final Summative in EmpTech

Final Summative in EmpTech

11th - 12th Grade

40 Qs

Health Science 3 - Ch. 3

Health Science 3 - Ch. 3

10th - 12th Grade

40 Qs

Aviation Regulations Quiz

Aviation Regulations Quiz

12th Grade - University

36 Qs

Automotive Electrical Systems: a 2021 Revision Aid

Automotive Electrical Systems: a 2021 Revision Aid

10th Grade - University

40 Qs

SYO-601 Practice Questions 42-82

SYO-601 Practice Questions 42-82

Assessment

Quiz

Instructional Technology

12th Grade

Medium

Created by

Darrielle Flemming-Robinson

Used 5+ times

FREE Resource

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is tuning SIEM rules based off of threat intelligence

reports. Which of the following phases of the incident response process

does this scenario represent?

Eradication

Preparation

Lessons Learned

Recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network manager is concerned that business may be negatively

impacted if the firewall in its datacenter goes offline. The manager would

like to implement a high availability pair to:

decrease the mean time between failures

cut dawn the mean time to repair.

remove the single point of failure.

reduce the recovery time objective.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A host was infected with malware. During the incident response, Joe, a

user, reported that he did not receive any emails with links, but he had

been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?

The DNS logs

The SIP traffic logs

The web server logs

The SNMP logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would MOST likely be identified by a Points

credentialed scan but would be missed by an uncredentialed scan?

Vulnerabilities with a CVSS score greater than 6.9.

CVEs related to nan-Microsoft systems such as printers and switches.

Critical infrastructure vulnerabilities on non-lP protocols.

Missing patches for third-party software on Windows workstations and

servers.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A recent phishing campaign resulted in several compromised user

accounts. The security incident response team has been tasked with

reducing the manual labor ot filtering through all the phishing emails as

they arrive and blocking the sender's email address, along with other

time-consuming mitigation actions. Which of the following can be configured to streamline those tasks?

SOAR playbook

Firewall rules

MOM policy

URLfilter

SIEM data collection

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a reason to publish files' hashes?

To validate the integrity af the files

To use the hash as a software activation ke

To verify if the software was digitally signed

To use the hash as a decryption passphrase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is tasked with classifying data to be stored on company

servers. Which of the following should be classified as proprietary?

Customers dates af birth

Marketing strategies

Customers email addresses

Employee salaries

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?