exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 410 discussion

Actual exam question from CompTIA's SY0-601
Question #: 410
Topic #: 1
[All SY0-601 Questions]

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Choose two.)

  • A. MAC filtering
  • B. Zero trust segmentation
  • C. Network access control
  • D. Access control vestibules
  • E. Guards
  • F. Bollards
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 2 years, 3 months ago
Selected Answer: CD
Guys, I'm going to have an exam tomorrow, I'm very nervous because my professional future depends on this result, but I have faith in God that everything will work out. Thank you all for your help here at ExamTopics.
upvoted 77 times
NeoSam999
2 years, 3 months ago
How did it go? Hope you passed!
upvoted 4 times
...
Shermszn
2 years, 3 months ago
Hey bro how did the test go? Did these questions cover the exam well?
upvoted 3 times
[Removed]
2 years, 3 months ago
Friends, I took the exam today and passed. Score = 769 The questions here covered about 50% of the exam, so my tip is: Focus on the questions and come up with your own answers, the exam might surprise you.
upvoted 33 times
rf18
2 years, 2 months ago
congratulations and goodluck
upvoted 2 times
...
[Removed]
2 years, 3 months ago
But all PBQs were on the exam. I apologize for the bad English, I'm using a translator.
upvoted 13 times
RvR109
2 years, 3 months ago
There are like 400 questions on this page, you don't maybe know which of the questions here are on the exam? I studied all 300 questions and now they added another 100, it's messing me up.
upvoted 4 times
[Removed]
1 year, 4 months ago
there 800 questions now.
upvoted 13 times
...
...
...
...
...
[Removed]
2 years, 3 months ago
Bro same. Mad nervous . I hope you passed! Please come back and update us.
upvoted 9 times
...
...
Ranaer
Highly Voted 2 years, 3 months ago
Selected Answer: DE
We are asked for the first line of defense. Not the most versatile, or best combination. What if we had it all, which ones would be the first two. Well we have to stop the adversaries from entering the facility of course. Access control vestibules and guards do this. Then we have the more technical solutions such as Mac filtering or NAC, but as I noted, we need to pick the two which would be our first line of defense.
upvoted 29 times
BlackSpider
1 year, 7 months ago
Those are the first lines of defense D. Physical Security and C. Information Security. D. Access Control Vestibules represent a physical security measure. By physically preventing unauthorized individuals from entering a facility, you add a first line of defense against any intrusions, including someone trying to plug in an unauthorized device. C. Network Access Control (NAC) is an information security measure. By controlling which devices can access the network based on predefined security postures, you add a digital line of defense to ensure that even if someone gets past the physical security, they can't just plug in a device and access the network. Together, they form the first lines of defense on both the physical and digital fronts.
upvoted 5 times
Alcpt
7 months, 2 weeks ago
no. 1st line is physical. If you cant get past the guards and vestibule then the 2nd layer is unaffected. = D and E
upvoted 1 times
...
...
...
Jayysaystgis
Most Recent 6 months, 3 weeks ago
D and E
upvoted 1 times
...
Alcpt
6 months, 4 weeks ago
Selected Answer: DE
First line of defense is preventing building access. D&E.
upvoted 1 times
...
Froggy300
10 months ago
Selected Answer: CD
You want both a physical control and a network control.
upvoted 1 times
...
AbdullahMohammad251
11 months, 2 weeks ago
Selected Answer: DE
First line of defense: Implementing physical security measures. Second line of defense: Implementing technical security measures. First, you physically block the intruder from entering the facility using things like access control vestibules, fences, and security guards. If they bypass the physical security, we move to technical security, including MAC filtering and network access control.
upvoted 2 times
...
Eromons
11 months, 3 weeks ago
It talks about line of defence and also specify that the hacker used PLUGGING meaning a Deterrent and Preventive control should be put in place.
upvoted 1 times
...
AspiringNerd
1 year ago
Selected Answer: DE
“Entering a facility”
upvoted 2 times
...
BD69
1 year, 1 month ago
Selected Answer: DE
First line of defense: D & E A,B, & C are second lines of defense Bollards just prevent a vehicle from crashing in. Without them, if someone crashed in, they would be spotted immediately.
upvoted 2 times
...
BD69
1 year, 2 months ago
Selected Answer: DE
The correct answer for the FIRST line of attack SHOULD be D & E, however, if they mean technical controls, then it's B & C. MAC filtering is pretty lame since it can be compromised in seconds.
upvoted 2 times
...
6809276
1 year, 2 months ago
Selected Answer: DE
First line of defense should be even BEFORE reaching the server which will be D and E. A guard and access control.
upvoted 2 times
...
zecomeia_007
1 year, 3 months ago
Selected Answer: DE
First Line
upvoted 1 times
...
Eikan
1 year, 3 months ago
Selected Answer: DE
D - Access Control Vestibules & E - Guards
upvoted 1 times
...
cantbeme
1 year, 3 months ago
Selected Answer: DE
My Answer....k.i.s.s
upvoted 3 times
...
EighthNotes
1 year, 3 months ago
Selected Answer: DE
I choose DE because its asking for first line of defense before attacker can jack in a kali linux box, so i dont see why NAC would be necessary if a guard and vestibules are available options
upvoted 2 times
...
12f1a9a
1 year, 4 months ago
C and D are both physical controls and it is quite possible to perform social engineering so that the guard might let the attacker in. If this is a possibility then there has to be a technical control too which is NAC. So I go with NAC and vestibule
upvoted 2 times
BD69
1 year, 2 months ago
C is not a physical control
upvoted 1 times
...
...
Comicbookman
1 year, 5 months ago
The Question has Key giveaways, (concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box) They are walking into the facility Physically. The intent is to plug in a Laptop, A cellphone, rasberry pi, or tablet with kali. Then connecting physically. So you would require physical deterrents. Such as guards and Access control Vestibules. Don't overthink it and keep it simple. D and E.
upvoted 1 times
Comicbookman
1 year, 5 months ago
A second line of defence to add is (NAC) is a technique that restricts access to a network based on the identity, role, device, location, or other criteria of the users or devices. But the Initial applies as stopping the One way in and one way out physical entry. A concern for Insider threat would be to apply NAC. But that would be already in play before hand for the Network.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago