CompTIA Security+ SY0-601 – Question379

Multiple beaconing activities to a malicious domain have been observed. The malicious domain is hosting
malware from various endpoints on the network. Which of the following technologies would be BEST to
correlate the activities between the different endpoints?


A.
Firewall
B. SIEM
C. IPS
D. Protocol analyzer

Correct Answer: B

CompTIA Security+ SY0-601 – Question378

An organization is outlining data stewardship roles and responsibilities. Which of the following employee roles
would determine the purpose of data and how to process it?


A.
Data custodian
B. Data controller
C. Data protection officer
D. Data processor

Correct Answer: B

CompTIA Security+ SY0-601 – Question377

A security administrator, who is working for a government organization, would like to utilize classification and
granular planning to secure top secret data and grant access on a need-to-know basis. Which of the following
access control schemas should the administrator consider?


A.
Mandatory
B. Rule-based
C. Discretionary
D. Role-based

CompTIA Security+ SY0-601 – Question376

Which of the following is the BEST reason to maintain a functional and effective asset management policy that
aids in ensuring the security of an organization?


A.
To provide data to quantify risk based on the organization's systems
B. To keep all software and hardware fully patched for known vulnerabilities
C. To only allow approved, organization-owned devices onto the business network
D. To standardize by selecting one laptop model for all users in the organization

Correct Answer: C

CompTIA Security+ SY0-601 – Question375

A network administrator needs to determine the sequence of a server farm's logs. Which of the following should
the administrator consider? (Choose two.)


A.
Chain of custody
B. Tags
C. Reports
D. Time stamps
E. Hash values
F. Time offset

Correct Answer: DE

CompTIA Security+ SY0-601 – Question374

A company is looking to migrate some servers to the cloud to minimize its technology footprint. The company
has a customer relationship management system on premises. Which of the following solutions will require the
LEAST infrastructure and application support from the company?


A.
SaaS
B. IaaS
C. PaaS
D. SDN

Correct Answer: A

CompTIA Security+ SY0-601 – Question373

A malicious actor recently penetrated a company's network and moved laterally to the data center. Upon
investigation, a forensics firm wants to know what was in the memory on the compromised server. Which of the
following files should be given to the forensics firm?


A.
Security
B. Application
C. Dump
D. Syslog

Correct Answer: C

CompTIA Security+ SY0-601 – Question372

A security administrator is evaluating remote access solutions for employees who are geographically dispersed.
Which of the following would provide the MOST secure remote access? (Choose two.)


A.
IPSec
B. SFTP
C. SRTP
D. LDAPS
E. S/MIME
F. SSL VPN

Correct Answer: AF

CompTIA Security+ SY0-601 – Question371

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain
control over company emails residing on the devices and limit data exfiltration that might occur if the devices
are lost or stolen. Which of the following would BEST meet these requirements? (Choose two.)


A.
Full device encryption
B. Network usage rules
C. Geofencing
D. Containerization
E. Application approve list
F. Remote control

Correct Answer: DF