exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 412 discussion

Actual exam question from CompTIA's SY0-601
Question #: 412
Topic #: 1
[All SY0-601 Questions]

A security administrator wants to implement a program that tests a user's ability to recognize attacks over the organization’s email system. Which of the following would be best suited for this task?

  • A. Social media analysis
  • B. Annual information security training
  • C. Gamification
  • D. Phishing campaign
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
workhard
Highly Voted 2 years, 1 month ago
Selected Answer: D
Note that CompTIA lists these methodologies under "User training": - Gamification - Capture the flag - Phishing campaigns - Phishing simulations - Computer-based training (CBT) - Role-based training
upvoted 8 times
...
LordJaraxxus
Most Recent 1 year, 3 months ago
Selected Answer: D
I might have been wrong with my first statement Phishing simulations mimic the type of phishing campaigns used by attackers and allow an organization to safely check to see if employees will respond to phishing emails
upvoted 1 times
...
LordJaraxxus
1 year, 3 months ago
Selected Answer: C
With phishing campaign some user understand how to respond but in reality there are a lot of people who still don't pay attention and click on the link. From my Darril Gibson Guide that says this I choose Gamification: Gamification intertwines game-design elements within user training methods to increase participation and interaction. It is often used in courseware and online training, but it can be used differently depending on the goals. As an example, imagine a company has tried to educate employees about phishing emails using several different techniques. Unfortunately, for some reason, employees aren’t getting the message, and the company just experienced another security incident after an employee responded to a phishing email. The chief information officer (CIO) could launch occasional unannounced phishing simulations and give some sort of prize to the department with the fewest responses.
upvoted 1 times
...
LeonardSnart
2 years ago
Selected Answer: D
Thought it would be B or C but D seems correct after all "For example, a department (perhaps working with the chief information security officer) that has oversight over the organization’s security posture might measure the number of unauthorized information systems plugged into the network within a month. It might also monitor the number of systems that are not properly patched or the number of viruses contracted within a given time. A common metric that aligns with training is the number of users falling prey to simulated phishing campaigns. Gathering this type of data allows management to spot trends and frequent offenders and to take corrective actions." -Mike Meyers' Security+ Certification Passport SY0-601 Sixth Edition by Dawn Dunkerley
upvoted 1 times
...
ApplebeesWaiter1122
2 years, 1 month ago
Selected Answer: D
D, Prof Messer states that the best defense is awareness and knowledge
upvoted 4 times
ApplebeesWaiter1122
2 years, 1 month ago
Phishing campaign would be the best suited for this task. A phishing campaign is a simulated attack that is designed to trick users into divulging sensitive information or performing an action that can compromise security. By running a phishing campaign, the security administrator can test users' ability to recognize and report attacks over the organization's email system.
upvoted 3 times
...
...
F6665GG
2 years, 1 month ago
Selected Answer: C
For Darill book, I pick Gamification
upvoted 1 times
...
mouettespaghetti
2 years, 1 month ago
-D is correct Phishing campaign is best suited for testing a user's ability to recognize attacks over the organization's email system. Phishing is a social engineering technique used by attackers to trick users into divulging sensitive information, such as login credentials or personal information. By launching a simulated phishing campaign, a security administrator can test whether employees are able to identify and avoid phishing attempts. This can help to raise awareness about the dangers of phishing and improve the overall security posture of the organization.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...