Go Back on SY0-601 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SY0-601 Practice Test


Page 20 out of 178 Pages

Topic 3: Exam Pool C

Some laptops recently went missing from a locked storage area that is protected by
keyless RFID-enabled locks. There is no obvious damage to the physical space. The
security manager identifies who unlocked the door, however, human resources confirms
the employee was on vacation at the time of the incident. Which of the following describes
what MOST likely occurred?


A.

The employee's physical access card was cloned.


B.

The employee is colluding with human resources


C.

The employee's biometrics were harvested


D.

A criminal used lock picking tools to open the door.





A.
  

The employee's physical access card was cloned.



A company is adopting a BYOD policy and is looking for a comprehensive solution to protect company information on user devices. Which of the following solutions would BEST support the policy?


A.

Mobile device management


B.

Full-device encryption


C.

Remote wipe


D.

Biometrics





A.
  

Mobile device management



A network engineer needs to create a plan for upgrading the wireless infrastructure in a
large office Priority must be given to areas that are currently experiencing latency and
connection issues. Which of the following would be the BEST resource for determining the
order of priority?


A.

Nmapn


B.

Heat maps


C.

Network diagrams


D.

Wireshark





C.
  

Network diagrams



A privileged user at a company stole several proprietary documents from a server. The
user also went into the log files and deleted all records of the incident. The systems
administrator has Just informed investigators that other log files are available for review.
Which of the following did the administrator MOST likely configure that will assist the
investigators?


A.

Memory dumps


B.

The syslog server


C.

The application logs


D.

The log retention policy





B.
  

The syslog server



A security analyst discovers several .jpg photos from a cellular phone during a forensics
investigation involving a compromised system. The analyst runs a forensics tool to gather
file metadata. Which of the following would be part of the images if all the metadata is still
intact?


A.

The GPS location


B.

When the file was deleted


C.

The total number of print jobs


D.

The number of copies made





A.
  

The GPS location




Page 20 out of 178 Pages
Previous