Uploaded by gmathew753

Architecture and Design Security + Questions

advertisement
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Architecture and Design
Question #1 of 115
Test ID: 243608020
Question ID: 1345243
Which algorithm is used as the digital signature for the US government, and was developed by NIST and the NSA?
A) CTR
B) DSA
C) GCM
D) ECB
Question #2 of 115
Question ID: 1438688
Your company has decided to implement a biometric system to ensure that only authorized personnel are able to
access several secure areas at the facility. However, management is concerned that users will have privacy concerns
when the biometric system is implemented. You have been asked to recommend the least intrusive biometric system of
the listed options. Which option is considered the least intrusive?
A) fingerprint
B) voice print
C) iris scan
D) retinal scan
Question #3 of 115
Question ID: 1345224
You need to ensure that USB flash drives issued by your organization are protected by encryption. What should you
implement?
A) BitLocker To Go
B) Data Encryption Standard
C) Advanced Encryption Standard
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
1/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Encrypting File System
Question #4 of 115
Question ID: 1487138
Your company has recently started adopting formal security policies to comply with several state regulations. One of the
security policies states that certain hardware is vital to the organization. As part of this security policy, you must ensure
that you have the required number of components plus one extra to plug into any system in case of failure. Which
strategy is this policy demonstrating?
A) fault tolerance
B) cold site
C) clustering
D) server redundancy
Question #5 of 115
Question ID: 1438720
Your organization is trying to decide whether to use RSA or ECC to encrypt cellular communications. What is an
advantage of ECC over the RSA algorithm?
A) ECC uses elliptic curves that improve its reliability.
B) ECC does not deal with the intricacies of digital signatures.
C) ECC requires fewer resources.
D) ECC uses elliptic curves instead of keys to provide security.
Question #6 of 115
Question ID: 1438727
Which of the following common use cases would address the issue of data leakage from a side-channel attack?
A) Supporting non-repudiation
B) Supporting high resiliency
C) Supporting integrity
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
2/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Supporting confidentiality
Question #7 of 115
Question ID: 1345233
After researching different security mechanisms, your company decides to implement PGP instead of a formal PKI and
formal trust certificates. Which of the following is a characteristic of PGP?
A) the deployment of private keys for authentication and encryption
B) the establishment of a web of trust between the users
C) the use of certification authority (CA) servers
D) the use of trust domains by the servers and the clients
Question #8 of 115
Question ID: 1438698
You have implemented a backup plan that includes both full and incremental backups. What does an incremental
backup do?
A) It backs up all files.
B) It backs up all new files and any files that have changed since the last full or
incremental backup and resets the archive bit.
C) It backs up all files in a compressed format.
D) It backs up all new files and any files that have changed since the last full backup
without resetting the archive bit.
Question #9 of 115
Question ID: 1438692
E-commerce payment systems, like PayPal and Google Checkout, allow the user to use a single identity across
multiple platforms. Of which identity and access service is that an example?
A) Biometrics
B) Federation
C) Transitive trust
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
3/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Keyboard cadence
Question #10 of 115
Question ID: 1487141
Which of the following comprises principles that build security into a facility by design?
A) UAV
B) object detection
C) two-person control
D) industrial camouflage
Question #11 of 115
Question ID: 1438689
Users are complaining that the new biometric identification system is difficult to use. They are saying that even though
the initial login worked fine, they have difficulty logging in later. In addition to user training, what should you investigate?
A) HOTP
B) CER
C) FRR
D) FAR
Question #12 of 115
Question ID: 1487135
As a system administrator, you have been tasked with determining which RAID system is appropriate for your
organization. To do this you must match the RAID configuration on the left with the appropriate functionality.
{UCMS id=5357069219659776 type=Activity}
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
4/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Question #13 of 115
Question ID: 1438731
Which type of encryption algorithm is vulnerable to quantum computing?
A) Symmetric encryption
B) One-way encryption
C) Asymmetric encryption
D) Lattice-based encryption
Question #14 of 115
Question ID: 1438719
You are currently comparing stream ciphers and block ciphers. You have decided to use only block ciphers and hash
algorithms on your organization's network. Which cryptographic algorithm is a stream cipher?
A) MD5
B) RC5
C) RC6
D) RC4
Question #15 of 115
Question ID: 1438732
Why are asymmetric encryption algorithms particularly vulnerable to cryptanalysis by quantum computers?
A) Quantum computers can operate on larger data sets than classical computers
with comparable resources.
B) Quantum computers can perform complex mathematical operations faster than
classical computers with comparable resources.
C) Quantum computers can be upgraded more easily and less expensively than
classical computers with comparable budgets.
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
5/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Quantum computers can perform simple mathematical operations faster than
classical computers with comparable resources.
Question #16 of 115
Question ID: 1345239
You are researching the RSA encryption algorithm. You need to provide some basic facts about this algorithm to your
organization's management team so they can decide if they want to implement it on the organization's network. Which
statement is NOT true of this algorithm?
A) RSA uses public and private key signatures for integrity verification.
B) An RSA algorithm is an example of symmetric cryptography.
C) RSA provides both encryption and authentication.
D) RSA can prevent man-in-the-middle attacks.
E) RSA encryption algorithms do not deal with discrete logarithms.
Question #17 of 115
Question ID: 1438678
Your company has recently decided to create a custom application instead of purchasing a commercial alternative. As
the security administrator, you have been asked to develop security policies and procedures on examining the written
code to discover any security holes that may exist. Which assessment type will be performed as a result of this new
policy?
A) secure code review
B) review design
C) vulnerability scanning
D) baseline reporting
Question #18 of 115
Question ID: 1345211
Your company has recently adopted a new security policy that states that all confidential e-mails must be signed using
a digital signature. Which three elements are provided by implementation of this technology? (Choose three.)
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
6/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) encryption
B) authentication
C) integrity
D) availability
E) non-repudiation
Question #19 of 115
Question ID: 1345212
After a recent security audit, several security issues were found. The auditor made suggestions on technologies that
your organization should deploy. One of the suggestions made is to deploy SKIP. Which statement is true of SKIP?
A) SKIP is only a key storage protocol.
B) SKIP works on a response-by-session basis.
C) SKIP deploys IKE for key distribution and management.
D) SKIP is a key distribution protocol.
Question #20 of 115
Question ID: 1345215
Your organization has recently adopted a new security policy. As part of this policy, you must implement the appropriate
technologies to provide confidentiality. Which technology provides this?
A) authentication
B) a disk array
C) asymmetric encryption
D) a digital signature
Question #21 of 115
Question ID: 1345245
Recently, your organization implemented a new security policy which states that watermarks must be used for all
copyrighted material. Which statement is true of a watermark?
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
7/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) A watermark cannot be embedded in an audio file.
B) A watermark cannot be removed.
C) A watermark is never visible to the naked human eye.
D) A watermark can enable you to detect copyright violations.
Question #22 of 115
Question ID: 1438729
Which cryptographic attacks attempt to produce the same hash value from a brute force attack using two inputs?
(Choose two.)
A) Collision
B) Weak Implementations
C) Replay
D) Birthday
Question #23 of 115
Question ID: 1487127
Match the descriptions on the left with the cloud deployments on the right.
{UCMS id=5643568213393408 type=Activity}
Question #24 of 115
Question ID: 1487137
Your company decides to implement a RAID-5 array on several file servers. Which feature is provided by this
deployment?
A) Distributed allocation
B) High availability
C) Scalability
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
8/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Elasticity
Question #25 of 115
Question ID: 1438706
Which of the following describe an inherent vulnerability found in many drone and unmanned aerial vehicles?
A) Overwhelming the device with large amounts of data, causing it to crash
B) Forcing the device to follow a different flight plan using a rogue transmitter
C) Uploading malicious files, disconnecting the device from the remote controller
D) Downloading sensitive files from the device, as an unauthorized super user
Question #26 of 115
Question ID: 1487129
Which type of file contains low-level instructions to be executed directly on a specific system or computer platform?
A) Source
B) Script
C) Framework
D) Binary
Question #27 of 115
Question ID: 1487130
Why is reviewing script files for malicious code easier than reviewing binary files??
A) The interpretation process obfuscates and reduces the likelihood of reverse
engineering
B) Script files contain source code with human readable instructions
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
9/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
C) Script files use open-source frameworks with more widely available
documentation
D) The compilation process condenses the code into human readable instructions
Question #28 of 115
Question ID: 1345216
You are providing end-user security awareness training. As part of this training, you explain why the organization uses
asymmetric encryption and how it works. What is used to decrypt a file in this type of encryption?
A) plaintext
B) public key
C) private key
D) message digest
Question #29 of 115
Question ID: 1487125
Which of the following protection methods applies to data in processing or in use? (Choose all that apply.)
A) Physical protection
B) Hashing
C) Backup management
D) Access control
E) Fault tolerance
F) Encryption
Question #30 of 115
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
Question ID: 1438685
10/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
You are a security consultant. An organization hires you to implement a biometric system. This system should work in
conjunction with a password to provide increased security. Which method should you implement?
A) keystroke dynamics
B) password aging
C) password encryption
D) password checkers
Question #31 of 115
Question ID: 1487143
You need to remove data from a storage media that is used to store confidential information. Which method is NOT
recommended?
A) formatting
B) degaussing
C) zeroization
D) destruction
Question #32 of 115
Question ID: 1345223
Recently, several confidential messages from your company have been intercepted. Your company has decided to
implement PGP to encrypt files. Which type of model does this encryption use?
A) hierarchy
B) bus
C) web
D) ring
Question #33 of 115
Question ID: 1438722
You have been hired as a security consultant for a large corporation. During a meeting with the IT department, the IT
manager indicates that one of their applications uses a private key encryption standard that was developed in Russia
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
11/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
and uses 256-bit encryption keys. Which encryption standard does the application use?
A) CAST-128
B) IDEA
C) RC5
D) GOST
Question #34 of 115
Question ID: 1438708
Which two suppression methods are recommended when paper, laminates, and wooden furniture are the elements of a
fire in the facility? (Choose two.)
A) Soda acid
B) Dry powder
C) Water
D) Halon
Question #35 of 115
Question ID: 1438686
Your organization has recently adopted a new organizational security policy. As part of this new policy, management
has decided to implement an iris scanner wanting access to the secure data center. Which procedure does this use to
authenticate users?
A) It scans the shape of the user's face and compares the face scan with faces on
file.
B) It takes a picture of the user's eye and compares the picture with pictures on file.
C) It scans the blood vessels in the user's eye and compares the pattern with
patterns on file.
D) It scans the user's handwriting and compares the handwriting with a sample on
file.
Question #36 of 115
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
Question ID: 1345238
12/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Management has asked you to implement an encryption algorithm that is based on the Diffie-Hellman key agreement.
Which encryption algorithm should you implement?
A) Knapsack
B) ElGamal
C) International Data Encryption Algorithm
D) HAVAL
Question #37 of 115
Question ID: 1345229
You have been asked to choose a hashing algorithm for your organization. You decide to implement SHA-1. Which size
checksum is produced by this algorithm?
A) 128-bit
B) 256-bit
C) 56-bit
D) 160-bit
Question #38 of 115
Question ID: 1487132
You are responsible for designing your company's identification, authentication, and authorization system to ensure that
the company's network is protected from unauthorized access. What is the purpose of authentication on this network?
A) verifying the identity of users
B) encrypting files
C) backing up data stored on hard disks
D) allowing users to access resources
Question #39 of 115
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
Question ID: 1345227
13/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Your company needs to protect message integrity. Management decides that you need to implement an algorithm that
uses 160-bit checksums. Which algorithm should you implement?
A) SHA
B) AES
C) DES
D) MD5
Question #40 of 115
Question ID: 1438724
Which cipher uses a binary key and is often combined with or incorporated into a symmetric algorithm because it is not
secure when used by itself?
A) RIPEMD
B) substitution
C) ROT13
D) XOR
Question #41 of 115
Question ID: 1438673
Order the six phases of the software development life cycle from first to the last phase.
{UCMS id=5703176817737728 type=Activity}
Question #42 of 115
Question ID: 1345194
You need to design a backup plan for your company’s file server. You are most concerned with the restoration time.
Which of the following would take the least amount of time to restore?
A) Snapshots
B) Full backup
C) Differential backup
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
14/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Incremental backup
Question #43 of 115
Question ID: 1487123
Management at your company has requested that you implement DLP. What is the purpose of this technology?
A) It protects against malware.
B) It monitors data on computers to ensure the data is not deleted or removed.
C) It allows organizations to use the Internet to host services and data remotely
instead of locally.
D) It implements hardware-based encryption.
Question #44 of 115
Question ID: 1438661
You are developing the configuration/change management plan for the company. Move the roles on the left to their
associated responsibilities in the process. (A single role may have multiple responsibilities.)
{UCMS id=5459879328219136 type=Activity}
Question #45 of 115
Question ID: 1438663
You have been hired as a security administrator for a large business. The previous security administrator left behind
documentation on the security policies and measures that the company implements. The network includes several
security devices, including a honeypot. Which active response to a hacker attack describes this device?
A) termination of a connection
B) termination of a process
C) network reconfiguration
D) deception
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
15/40
3/14/23, 12:44 AM
Question #46 of 115
SY0-601 Exam Simulation
Question ID: 1438728
Recently, your organization has experienced several password attacks. Management has asked you to provide
additional security to ensure that this does not happen again. You decide to implement a key stretching function. Which
of the following could you use? (Check all that apply.)
A) PBKDF2
B) Bcrypt
C) DES
D) 3DES
E) RSA
Question #47 of 115
Question ID: 1438702
Which of the following transmit data via Wi-Fi or Bluetooth only to a host device and are vulnerable to data interception
and attack?
A) UAV
B) Medical devices
C) Personal vehicles
D) Wearable technology
Question #48 of 115
Question ID: 1345173
You organization has decided the implement keyboard cadence as part of authentication. Of which type of
authentication factor is this an example?
A) Something you do
B) Something you know
C) Something you have
D) Something you are
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
16/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Question #49 of 115
Question ID: 1345230
Management has asked you to implement MD5 to verify data integrity. However, you are concerned that MD5 is not
strong enough. Which size checksum does this algorithm produce?
A) 160-bit
B) 128-bit
C) 56-bit
D) 256-bit
Question #50 of 115
Question ID: 1438730
You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on
when you are evaluating implementation versus algorithm selection? (Choose two.)
A) Crypto service providers
B) Crypto modules
C) Key strength
D) Key stretching
E) Security through obscurity
Question #51 of 115
Question ID: 1438660
You are developing a configuration management strategy. In what order would you develop the following aspects of
configuration management? Order the steps on the left into the correct sequence.
{UCMS id=5670352120184832 type=Activity}
Question #52 of 115
Question ID: 1487139
Which controls should you implement to mitigate the security risks of a Supervisory Control and Data Acquisition
(SCADA) systems? (Choose all that apply.)
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
17/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) firmware version control
B) application firewall
C) network segments
D) ACLs
Question #53 of 115
Question ID: 1438715
You need to apply a physical security control so that no electrical signals can escape the room. Which control should
you apply?
A) USB data blocker
B) Faraday cage
C) Protected cable distribution
D) Air gap
Question #54 of 115
Question ID: 1438707
When considering home or office alarm systems, which availability feature leaves them open to remote attacks?
A) Convenient power plug standard
B) Internet connection
C) Wi-Fi Protected Setup button
D) Cloud-based storage of images
Question #55 of 115
Question ID: 1438671
Which process allows you to deploy, configure, and manage data centers through scripts?
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
18/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) IaC
B) Waterfall
C) Immutable systems
D) Baselining
Question #56 of 115
Question ID: 1345174
You are training several IT professionals on security and access control. You need to explain to the professionals the
most common form of identification and authentication. What identification and authentication mechanism should you
explain?
A) smart cards
B) biometrics
C) two-factor authentication
D) user identification with reusable password
Question #57 of 115
Question ID: 1480184
You must properly protect the demilitarized zone (DMZ) from unnecessary traffic. Identify the DMZ in the following
graphic.
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
19/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) Network B
B) Network D
C) Network C
D) Network A
Question #58 of 115
Question ID: 1345202
You have a highly mobile workforce, and they often work in airplanes, airports, and other public places. Management is
concerned that unauthorized users can obtain information when personnel are using the devices in public places.
Which of these could be implemented to help mitigate risk?
A) Airgap
B) Key management
C) Logs
D) Screen filters
Question #59 of 115
Question ID: 1345234
Your company must implement a subnetwork that is highly secure. Management asks you to implement an encryption
method that is used only once for a single document. Which encryption method should you use?
A) Caesar cipher
B) OTP
C) DES
D) substitution cipher
Question #60 of 115
Question ID: 1438664
What is a honeypot?
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
20/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) a disruptive strategy that allows you to maximize the effectiveness of your decoy
B) an enterprise management software designed to mediate access to cloud
services
C) a skeleton of the network without any data or functionality
D) a computer system that draws in malicious actors to determine how attackers
break into systems
Question #61 of 115
Question ID: 1487136
A user accidentally installed a driver that had issues. You have been asked to return the computer to its state prior to
the driver installation. What is most likely the quickest method of meeting this requirement?
A) Live boot media
B) Snapshots
C) Master image
D) Memory dump
Question #62 of 115
Question ID: 1345197
Which of these options is particularly dangerous because it processes data with little or no latency?
A) SoC
B) RTOs
C) Home automation
D) Wearable technology
Question #63 of 115
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
Question ID: 1438679
21/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
As the lead for a software development team, you must establish secure development requirements. Which of the
following best practices must be included for secure software development? (Choose all that apply.)
A) Input sanitization should validate all characters against a whitelist
B) Input validation should be performed only on the server-side to limit client buffer
overflows
C) If a TLS connection fails, the connection should default back to standard HTTP
D) Session IDs should be included in the URL for web applications
E) Use only HTTP POST requests for sending web authentication credentials
Question #64 of 115
Question ID: 1345161
What are some disadvantages to using a cold site? (Choose all that apply.)
A) recovery time
B) testing availability
C) administration time
D) expense
Question #65 of 115
Question ID: 1438676
In which lower environment are the basic errors of an application detected and resolved?
A) Production
B) Staging
C) Development
D) Testing
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
22/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Question #66 of 115
Question ID: 1438662
You are considering cloud services, and you concerned about the interaction of your security policies and those of the
hosting provider. What can alleviate your concern?
A) Cloud access security brokers
B) VDI
C) VM escape protection
D) Stress testing
Question #67 of 115
Question ID: 1438670
Your organization has discovered the cost savings associated with virtual machines and is encouraging rapid adoption.
Which concept should you implement before things get out of control?
A) VM sprawl avoidance
B) Cloud access security broker
C) VM escape protection
D) Cloud storage
Question #68 of 115
Question ID: 1345237
Your organization has decided to implement an encryption algorithm to protect data. One IT staff member suggests that
the organization use IDEA. Which strength encryption key is used in this encryption algorithm?
A) 256-bit
B) 64-bit
C) 56-bit
D) 128-bit
Question #69 of 115
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
Question ID: 1438684
23/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
You have been asked to implement a biometric method that analyzes both the physical motions that are performed
when a signature is signed and the specific features of a person's signature. Which biometric system should you
implement?
A) digital signature
B) hand geometry
C) signature dynamics
D) keystroke dynamics
Question #70 of 115
Question ID: 1438716
Which of the following would be an example of a design weakness?
A) Not including a DMZ
B) Failing to store private keys, public keys, or certificates securely
C) Not documenting new assets as the system grows
D) Not updating antivirus software
Question #71 of 115
Question ID: 1438683
You need to implement an authentication system that verifies the identity of the users. Which type of authentication
should you implement?
A) a password
B) a retinal scan
C) a smart card
D) a security token
Question #72 of 115
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
Question ID: 1438659
24/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
Which automation or scripting concept can reduce the risk that new equipment might not have all the same settings,
applications, and drivers as your existing equipment without changing vital user settings?
A) Automated courses of action
B) Configuration validation
C) Continuous monitoring
D) Templates
Question #73 of 115
Question ID: 1345162
Which two alternate data center facilities are the easiest to test? (Choose two.)
A) hot site
B) redundant site
C) cold site
D) warm site
Question #74 of 115
Question ID: 1345231
Management asks you to implement an encryption standard that uses a single 56-bit encryption key to encrypt 64-bit
blocks of data. Which encryption standard should you implement?
A) DES
B) SSL
C) TDES
D) Blowfish
Question #75 of 115
Question ID: 1438690
You are evaluating several biometric authentication systems. Which is the best metric to use to quantify the
effectiveness of the subject system?
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
25/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
A) FAR
B) HOTP
C) FRR
D) CER
Question #76 of 115
Question ID: 1438691
You are designing an access control system for a new company. The company has asked that you ensure that users
are authenticated with a central server. In addition, users should only have access to the files they need to perform their
jobs. When implementing access control, what is the appropriate order?
A) authentication, identification, authorization
B) identification, authentication, authorization
C) identification, authorization, authentication
D) authentication, authorization, identification
Question #77 of 115
Question ID: 1438666
What is the difference between a honeynet, honeypot, and honeytoken?
A) A honeynet is a disruptive strategy that allows you to maximize the effectiveness
of your decoys, a honeypot is an individual file or directory on a system, and a
honeytoken is a dynamically generated decoy used to slow down scanning.
B) A honeynet is a network of honeypots; a honeypot is a single system; and a
honeytoken is an individual file or directory on a system.
C) A honeynet is a collection of files on a specific attack strategy, a honeypot is a
folder that stores all the permissions for the honeynet, and a honeytoken is a
command used by the network admin to assign permissions to the honeynet
files.
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
26/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) A honeynet is a network made up of only virtual machines, a honeypot is section
of virtual machines on a network, and a honeytoken is mechanism used to
access a virtual machine on the network.
Question #78 of 115
Question ID: 1438721
Which encryption techniques are used by AES, DES, and Blowfish? (Choose two.)
A) PRNG
B) Symmetric algorithm
C) Random number generation
D) Diffusion
E) Asymmetric algorithm
Question #79 of 115
Question ID: 1438723
You have been asked to research the encryption algorithms available and make recommendations to management
about which to implement. One of the encryption algorithms that you are researching is RSA. Which type of encryption
algorithm does this algorithm represent?
A) asymmetric with authentication
B) asymmetric with authorization
C) symmetric with authentication
D) symmetric with digital signature
Question #80 of 115
Question ID: 1438717
What is the purpose of hot and cold aisles?
A) to provide an alternate location for IT services in case of disaster
B) to ensure that humidity remains at a certain level
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
27/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
C) to control airflow in the data center
D) to protect against electromagnetic interferences (EMI)
Question #81 of 115
Question ID: 1438713
Which intrusion detection system (IDS) uses a magnetic field to detect intrusions?
A) a passive infrared system
B) a photoelectric system
C) a proximity detector
D) an acoustical detection system
Question #82 of 115
Question ID: 1487124
Data may be subject to the laws and regulations of the nation in which it is collected, not necessarily where it is stored.
Which principle is being described?
A) Data sovereignty
B) Legal hold
C) Incident response plan
D) Chain of custody
Question #83 of 115
Question ID: 1345232
You have been hired as a security consultant. The company owner asks you to implement public key encryption to
protect messages traveling between two points. Which algorithm should you implement?
A) IDEA
B) RC5
C) RSA
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
28/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Skipjack
Question #84 of 115
Question ID: 1487142
What is a physical barrier that acts as the first line of defense against an intruder?
A) a bollard
B) a lock
C) a mantrap
D) a fence
E) a turnstile
Question #85 of 115
Question ID: 1438734
Which description best applies to blockchain?
A) Type of cryptocurrency
B) Private ledger of transactions
C) Linked series of records
D) System of centralized wallets
Question #86 of 115
Question ID: 1438735
What is the role of nodes in a transaction using blockchain?
A) They initiate the blockchain
B) They request the transaction
C) They validate the transaction
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
29/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) They issue the cryptocurrency
Question #87 of 115
Question ID: 1345192
Your company has a backup solution that performs a full backup each Saturday evening and an incremental backup all
other evenings. A vital system crashes on Monday morning. How many backups will need to be restored?
A) one
B) three
C) four
D) two
Question #88 of 115
Question ID: 1487134
You are required to isolate vulnerabilities and minimize errors when securing your company's network. You decide to
use redundant technologies from various suppliers so that the company is not dependent on any single system. Which
strategy does this decision describe?
A) Control diversity
B) Defense-in-depth
C) Separation of duties
D) Vendor diversity
Question #89 of 115
Question ID: 1438733
You have recently been hired as a security administrator for your company. In the security documentation, it mentions
that message authentication code (MAC) is implemented. What does this ensure?
A) message availability
B) message confidentiality
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
30/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
C) message integrity
D) message replay
Question #90 of 115
Question ID: 1345217
As a security administrator, you are responsible for ensuring that your organization's IT staff understands the security
mechanisms employed on the network. You are currently documenting the security mechanisms as part of the IT
training. During the documentation, you realize that many of the IT staff do not understand the basic terms used in IT
security. You need to document the terms and definitions that you will use. What is a mathematical formula that is used
in cryptography to encrypt data?
A) ciphertext
B) key
C) plaintext
D) algorithm
Question #91 of 115
Question ID: 1438687
You have been hired as a security administrator by your company. You have recommended that the organization
implement a biometric system to control access to the server room. You recommend implementing a system that
identifies an employee by the pattern of blood vessels at the back of the employee's eyes. Which biometric system are
you recommending?
A) facial scan
B) retina scan
C) eye recognition
D) iris scan
Question #92 of 115
Question ID: 1487133
Match the authentication mechanisms on the left with the authentication types given on the right.
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
31/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
{UCMS id=5711433796943872 type=Activity}
Question #93 of 115
Question ID: 1438726
When implementing a security solution for mobile devices, which two common use cases are of primary concern?
(Choose two.)
A) Obfuscation
B) Authentication
C) Lower power devices
D) Low latency
E) Non-repudiation
Question #94 of 115
Question ID: 1345163
Which concept involves contracting with a third party who will provide a location and equipment to be used in the event
of an emergency?
A) Alternate processing sites
B) Disaster recovery plan
C) Offsite storage
D) Alternate business practices
Question #95 of 115
Question ID: 1487131
You are signing up for a new account on a web site. After you enter a password, the website prompts you to provide the
answers to security questions, such as the name of a childhood sweetheart or the color of your first car. What type of
multifactor authentication is this?
A) Something you have
B) Something you know
C) Something you are
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
32/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Something you do
Question #96 of 115
Question ID: 1438675
In which lower environment are general security requirements verified in an application before being released to the
general public?
A) Staging
B) Production
C) Development
D) Testing
Question #97 of 115
Question ID: 1438712
Your organization protects its data center using a smart lock. Each user has a unique code to enter in the smart lock to
access the data center. The code is configured to only allow access during certain times and days. Which type of lock is
implemented?
A) mechanical lock
B) tumbler lock
C) cipher lock
D) combination lock
Question #98 of 115
Question ID: 1438703
Smart devices and Internet of Things (IoT) are growing rapidly. Which of these include embedded systems that are
security risks? (Choose all that apply.)
A) Printers
B) Home automation devices
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
33/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
C) Medical devices
D) Wearable technology
Question #99 of 115
Question ID: 1438693
You need to implement voice over IP (VoIP) and wireless services for your company. Which AAA implementation was
created to deal with these?
A) TACACS+
B) TACACS
C) Diameter
D) XTACACS
Question #100 of 115
Question ID: 1345214
You have been promoted to security administrator. Recently, management implemented a security policy that states
that symmetric cryptography must be used. However, your research indicates the asymmetric cryptography is a better
choice for your organization. Which statement is true of symmetric cryptography?
A) Symmetric cryptography uses different keys to encrypt and decrypt messages.
B) Symmetric cryptography provides better security compared to asymmetric
cryptography.
C) Symmetric cryptography does not require a secure mechanism to properly
deliver keys.
D) Symmetric cryptography is faster than asymmetric cryptography.
Question #101 of 115
Question ID: 1345236
You have been asked to implement the encryption standard that is used in the Clipper Chip. Which encryption standard
should you use?
A) Skipjack
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
34/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
B) AES
C) DES
D) Blowfish
Question #102 of 115
Question ID: 1438677
Which integrity strategy is used to ensure that application code has not been tampered with since it was checked in by
a developer?
A) Integration testing
B) Monitoring control
C) Unit testing
D) Versioning control
Question #103 of 115
Question ID: 1345228
You need to ensure that several confidential files are not changed. You decide to use an algorithm to create message
digests for the confidential files. Which algorithm should you use?
A) AES
B) IDEA
C) DES
D) SHA-1
Question #104 of 115
Question ID: 1438694
Your users often forget their passwords and ask for assistance. You send a link to reset the password. You would like to
incorporate a time limit for the user to respond to the link. Which would you incorporate?
A) HOTP
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
35/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
B) ABAC
C) FRR
D) TOTP
Question #105 of 115
Question ID: 1438725
You have been hired as a security consultant. One of your recommendations is that the organization should implement
encryption for all data, including data at rest, data in use, and data in transit. Which security service does this provide?
A) integrity
B) accountability
C) confidentiality
D) availability
Question #106 of 115
Question ID: 1487140
Which technology will phreakers attack?
A) NAT
B) Web servers
C) VoIP
D) firewalls
Question #107 of 115
Question ID: 1438701
Which phrase describes adjusting load capacity on a virtual machine by adding additional processor and memory
resources?
A) Diagonal scaling
B) Horizontal scaling
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
36/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
C) Scaling up
D) Scaling out
Question #108 of 115
Question ID: 1487128
Your company needs to select the appropriate cloud model and category to deploy. Match the cloud model or category
with its appropriate description.
{UCMS id=5100296546025472 type=Activity}
Question #109 of 115
Question ID: 1487126
Your company needs to be able to provide employees access to a suite of applications. However, you do not want the
employees to install a local copy of the applications. Which method should you use to deploy the suite of applications?
A) Virtualization
B) Software as a Service
C) Platform as a Service
D) Infrastructure as a Service
Question #110 of 115
Question ID: 1438680
As the project lead for a development project, you must ensure that web application code is protected against the
OWASP Top 10 exploits. Which of the following best practices should you follow? (Choose three.)
A) Perform input sanitization and validation to protect against injection attacks
B) Create application passwords that meet complexity requirements to protect
against brute force attacks
C) Separate untrusted data from active browser content to mitigate XSS attacks
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
37/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
D) Verify the effectiveness of client-side access controls using SAST and DAST
tools
E) Maintain a reliable patch management policy to mitigate known software
vulnerabilities
Question #111 of 115
Question ID: 1345241
You are the security administrator for an organization. Management decides that all communications on the network
should be encrypted using the data encryption standard (DES) or Triple DES (3DES) algorithm. Which statement is true
of these algorithms?
A) A 56-bit DES encryption is 256 times more secure than a 40-bit DES encryption.
B) A Triple DES (3DES) algorithm uses 48 rounds of computation.
C) A DES algorithm uses 32 rounds of computation.
D) The effective key size of DES is 64 bits.
Question #112 of 115
Question ID: 1487144
Which cryptographic technique changes multiple output bits when you change a single input bit?
A) Diffusion
B) IV
C) Salting
D) Confusion
Question #113 of 115
Question ID: 1438665
What is the difference between production honeypots and research honeypots?
A) Production honeypots are only utilized in production environments. Research
honeypots are only used in research-based environments.
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
38/40
3/14/23, 12:44 AM
SY0-601 Exam Simulation
B) Production honeypots protect data produced by artificial means. Research
honeypots protect data that is used solely for research purposes.
C) Production honeypots are a disruptive strategy that allows you to maximize the
effectiveness of decoys. Research honeypots use open-source strategies to
learn attackers’ techniques.
D) Production honeypots mitigate risks to production systems by aiding in attack
prevention, detection, and response. Research honeypots are informationgathering resources.
Question #114 of 115
Question ID: 1345204
Your organization has a security policy in place that states that all precautions should be taken to prevent physical theft
of mobile devices. Which precaution would prevent this?
A) Store mobile devices in a locked cabinet.
B) Install a remote sanitation application on each mobile device.
C) Implement password protection on each mobile device.
D) Implement a screen lock on each mobile device.
Question #115 of 115
Question ID: 1438681
When users log in to the network locally, they must provide their username and password. When users log in to the
network remotely, they must provide their username, password, and smart card.
Which two statements are true regarding your organization's security? (Choose two.)
A) The remote network login uses three-factor authentication.
B) The local network login uses two-factor authentication.
C) The local network login uses one-factor authentication.
D) The remote network login uses two-factor authentication.
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
39/40
3/14/23, 12:44 AM
https://www.kaplanlearn.com/education/test/print/73818772?testId=243608020
SY0-601 Exam Simulation
40/40
Download