Go Back on SY0-601 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SY0-601 Practice Test


Page 14 out of 178 Pages

Topic 3: Exam Pool C

A cybersecurity department purchased o new PAM solution. The team is planning to randomize the service account credentials of the Windows server first. Which of the following would be the BEST method to increase the security on the Linux server?


A.

Randomize the shared credentials


B.

Use only guest accounts to connect.


C.

Use SSH keys and remove generic passwords


D.

Remove all user accounts.





C.
  

Use SSH keys and remove generic passwords



An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to eliminate biometric enrollment processes while still allowing authorities to identify passengers with increasing accuracy over time. The more frequently passengers travel, the more accurately the service will identify them. Which of the following biometrics will MOST likely be used,
without the need for enrollment? (Choose two.)


A.

Voice


B.

Gait


C.

Vein


D.

Facial


E.

Retina


F.

Fingerprint





B.
  

Gait



D.
  

Facial



A security engineer needs to enhance MFA access to sensitive areas in a building. A key
card and fingerprint scan are already in use. Which of the following would add another
factor of authentication?


A.

Hard token


B.

Retina scan


C.

SMS text


D.

Keypad PIN





B.
  

Retina scan



An organization has decided to host its web application and database in the cloud Which of
the following BEST describes the security concerns for this decision?


A.

Access to the organization's servers could be exposed to other cloud-provider clients


B.

The cloud vendor is a new attack vector within the supply chain


C.

Outsourcing the code development adds risk to the cloud provider


D.

Vendor support will cease when the hosting platforms reach EOL.





B.
  

The cloud vendor is a new attack vector within the supply chain



A cybersecurity administrator needs to add disk redundancy for a critical server. The solution must have a two- drive failure for better fault tolerance. Which of the following RAID levels should the administrator select?


A.

0


B.

1


C.

5


D.

6





B.
  

1




Page 14 out of 178 Pages
Previous