Go Back on SY0-601 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SY0-601 Practice Test


Page 25 out of 178 Pages

Topic 3: Exam Pool C

A security engineer has enabled two-factor authentication on all workstations. Which of the
following approaches are the MOST secure? (Select TWO).


A.

Password and security question


B.

Password and CAPTCHA


C.

Password and smart card


D.

Password and fingerprint


E.

Password and one-time token


F.

Password and voice





C.
  

Password and smart card



D.
  

Password and fingerprint



Which of the following are requirements that must be configured for PCI DSS compliance? (Select TWO).


A.

Testing security systems and processes regularly


B.

Installing and maintaining a web proxy to protect cardholder data


C.

Assigning a unique ID to each person with computer access


D.

Encrypting transmission of cardholder data across private networks


E.

Benchmarking security awareness training for contractors


F.

Using vendor-supplied default passwords for system passwords





B.
  

Installing and maintaining a web proxy to protect cardholder data



D.
  

Encrypting transmission of cardholder data across private networks



A security analyst is running a vulnerability scan to check for missing patches during a
suspected security rodent During which of the following phases of the response process is
this activity MOST likely occurring?


A.

Containment


B.

Identification


C.

Recovery


D.

Preparation





B.
  

Identification



A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?


A.

Outh


B.

SSO


C.

SAML


D.

PAP





C.
  

SAML



A forensics examiner is attempting to dump password cached in the physical memory of a
live system but keeps receiving an error message. Which of the following BEST describes
the cause of the error?


A.

The examiner does not have administrative privileges to the system


B.

The system must be taken offline before a snapshot can be created


C.

Checksum mismatches are invalidating the disk image


D.

The swap file needs to be unlocked before it can be accessed





A.
  

The examiner does not have administrative privileges to the system




Page 25 out of 178 Pages
Previous