Get Certified Get Ahead SY0-601 Chapter 4-6 Questions

Get Certified Get Ahead SY0-601 Chapter 4-6 Questions

Professional Development

43 Qs

quiz-placeholder

Similar activities

SRE Foundation

SRE Foundation

Professional Development

40 Qs

A+ 1101 Study Quiz 1

A+ 1101 Study Quiz 1

Professional Development

46 Qs

Network Technology - Finals Reviewer 04

Network Technology - Finals Reviewer 04

Professional Development

40 Qs

21 st Century Literacy Skills

21 st Century Literacy Skills

Professional Development

40 Qs

Digital Functional Skills bank

Digital Functional Skills bank

Professional Development

43 Qs

Java Collections Trivia

Java Collections Trivia

Professional Development

45 Qs

Cybersecurity Exam Week 2

Cybersecurity Exam Week 2

Professional Development

47 Qs

ITIL SERVICE LIFECYCLE

ITIL SERVICE LIFECYCLE

Professional Development

41 Qs

Get Certified Get Ahead SY0-601 Chapter 4-6 Questions

Get Certified Get Ahead SY0-601 Chapter 4-6 Questions

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Trey Conn

Used 3+ times

FREE Resource

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it. What type of HIDS is in use?

Network-based

Signature-based

Heuristic-based

Anomaly-based

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are preparing to deploy a heuristic-based detection system to monitor network activity. Which of the following would you create first?

BPDU guard

Signatures

Baseline

Honeypot

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Lenny noticed a significant number of logon failures for administrator accounts on the organization's public website. After investigating it further, he notices that most of these attempts are from IP addresses assigned to foreign countries. He wants to implement a solution that will detect and prevent similar attacks. Which of the following is the BEST choice?

Implement a passive NIDS

Block all traffic from foreign countries

Implement an inline NIPS

Disable the administrator accounts

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Lisa created a document called password.txt and put the usernames of two accounts with elevated privileges. She then placed the file on her administrator account desktop on several servers. Which of the following BEST explains her actions?

She can use this file to retrieve the passwords if she forgets them

This file will divert attackers from the live network

The document is a honeyfile

The file is needed by an application to run when the system starts.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Your organization is planning to upgrade the wireless network used by employees. It will provide encrypted authentication of wireless users over TLS. Which of the following protocols are they MOST likely implementing?

EAP

PEAP

WPA2

WPA3

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Lisa is creating a detailed diagram of wireless access points and hotspots within your organization. What is another name for this?

Remote access VPN

Wireless footprinting

Channel overlap map

Architectural diagram

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You are assisting a small business owner in setting up a public wireless hotspot for her customers. She wants to allow customers to access the hotspot without entering a password. Which of the following is MOST appropriate for this hotspot?

Use Open mode

Use a PSK

Use Enterprise mode

Disable SSID broadcast

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?