Go Back on SY0-601 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SY0-601 Practice Test


Page 16 out of 178 Pages

Topic 3: Exam Pool C

A network engineer is troubleshooting wireless network connectivity issues that were
reported by users. The issues are occurring only in the section of the building that is closest
to the parking lot. Users are intermittently experiencing slow speeds when accessing
websites and are unable to connect to network drives. The issues appear to increase when
laptop users return desks after using their devices in other areas of the building. There
have also been reports of users being required to enter their credentials on web pages in
order to gain access to them. Which of the following is the MOST likely cause of this issue?


A.

An external access point is engaging in an evil-twin attack.


B.

The signal on the WAP needs to be increased in that section of the building.


C.

The certificates have expired on the devices and need to be reinstalled.


D.

The users in that section of the building are on a VLAN that is being blocked by the firewall.





A.
  

An external access point is engaging in an evil-twin attack.



A security manager for a retailer needs to reduce the scope of a project to comply with PCI
DSS. The PCI data is located in different offices than where credit cards are accepted. All
the offices are connected via MPLS back to the primary datacenter. Which of the following
should the security manager implement to achieve the objective?


A.

Segmentation


B.

Containment


C.

Geofencing


D.

Isolation





A.
  

Segmentation



A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are:
www.company.com (main website)
contactus.company.com (for locating a nearby location)
quotes.company.com (for requesting a price quote)
The company wants to purchase one SSL certificate that will work for all the existing
applications and any future applications that follow the same naming conventions, such as
store.company.com. Which of the following certificate types would BEST meet the
requirements?


A.

SAN


B.

Wildcard


C.

Extended validation


D.

Self-signed





B.
  

Wildcard



A security analyst needs to complete an assessment. The analyst is logged into a server
and must use native tools to map services running on it to the server's listening ports.
Which of the following tools can BEST accomplish this talk?


A.

Netcat


B.

Netstat


C.

Nmap


D.

Nessus





B.
  

Netstat



The following is an administrative control that would be MOST effective to reduce the
occurrence of malware execution?


A.

Security awareness training


B.

Frequency of NIDS updates


C.

Change control procedures


D.

EDR reporting cycle





A.
  

Security awareness training




Page 16 out of 178 Pages
Previous