(April-2021)Braindump2go SY0-601 PDF and SY0-601 VCE Dumps(Q307-Q314)

QUESTION 307

A systems analyst is responsible for generating a new digital forensics chain-of-custody form.

Which of the following should the analyst Include in this documentation? (Select TWO).


A.The order of volatility

B.A checksum

C.The location of the artifacts

D.The vendor's name

E.The date and time

F.A warning banner


Answer: AE


QUESTION 308

A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols.

A security engineer runs a port scan against the server from the Internet and sees the following output:

Which of the following steps would be best for the security engineer to take NEXT?


A.Allow DNS access from the internet.

B.Block SMTP access from the Internet

C.Block HTTPS access from the Internet

D.Block SSH access from the Internet.


Answer: D


QUESTION 309

Which of the following is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?


A.To provide data to quantity risk based on the organization's systems.

B.To keep all software and hardware fully patched for known vulnerabilities

C.To only allow approved, organization-owned devices onto the business network

D.To standardize by selecting one laptop model for all users in the organization


Answer: B


QUESTION 310

An attacker was easily able to log in to a company's security camera by performing a baste online search for a setup guide for that particular camera brand and model.

Which of the following BEST describes the configurations the attacker exploited?


A.Weak encryption

B.Unsecure protocols

C.Default settings

D.Open permissions


Answer: C


QUESTION 311

A cloud administrator is configuring five compute instances under the same subnet in a VPC.

Three instances are required to communicate with one another, and the other two must he logically isolated from all other instances in the VPC.

Which of the following must the administrator configure to meet this requirement?


A.One security group

B.Two security groups

C.Three security groups

D.Five security groups


Answer: B


QUESTION 312

An analyst is trying to identify insecure services that are running on the internal network.

After performing a port scan the analyst identifies that a server has some insecure services enabled on default ports.

Which of the following BEST describes the services that are currently running and the secure alternatives for replacing them' (Select THREE)


A.SFTP FTPS

B.SNMPv2 SNMPv3

C.HTTP, HTTPS

D.TFTP FTP

E.SNMPv1, SNMPv2

F.Telnet SSH

G.TLS, SSL

H.POP, IMAP

I.Login, rlogin


Answer: BCF


QUESTION 313

An attacker was easily able to log in to a company's security camera by performing a basic online search for a setup guide for that particular camera brand and model.

Which of the following BEST describes the configurations the attacker exploited?


A.Weak encryption

B.Unsecure protocols

C.Default settings

D.Open permissions


Answer: C


QUESTION 314

A security architect at a large, multinational organization is concerned about the complexities and overhead of managing multiple encryption keys securely in a multicloud provider environment.

The security architect is looking for a solution with reduced latency to allow the incorporation of the organization's existing keys and to maintain consistent, centralized control and management regardless of the data location.

Which of the following would BEST meet the architect's objectives?


A.Trusted Platform Module

B.laaS

C.HSMaaS

D.PaaS

E.Key Management Service


Answer: E


2021 Latest Braindump2go SY0-601 PDF and SY0-601 VCE Dumps Free Share:

https://drive.google.com/drive/folders/1VvH3gDuiIKHw7Kx_vZmMM4mpCRWbTVq4?usp=sharing

Follow
4.7 Star App Store Review!
Cpl.dev***uke
The Communities are great you rarely see anyone get in to an argument :)
king***ing
Love Love LOVE
Download

Select Collections