exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 360 discussion

Actual exam question from CompTIA's SY0-601
Question #: 360
Topic #: 1
[All SY0-601 Questions]

Which of the following technologies is used to actively monitor for specific file types being transmitted on the network?

  • A. File integrity monitoring
  • B. Honeynets
  • C. Tcpreplay
  • D. Data loss prevention
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Rhots
Highly Voted 1 year, 5 months ago
Selected Answer: D
Sneaky COMPTIA
upvoted 9 times
...
sdc939
Highly Voted 2 years, 2 months ago
Selected Answer: D
D. DLP
upvoted 8 times
Koki20
1 year, 6 months ago
D is correct.
upvoted 2 times
...
...
net8658
Most Recent 1 year, 5 months ago
Selected Answer: D
It's DLP
upvoted 1 times
...
Lobe
1 year, 6 months ago
This one was in my exam Oct 28, 2023. I went with D. Passed with 790. About 50% questions were from this dump but I don't have the contributor access. 3 Simulations: Firewalls, Attacks and data classification. Other questions were not that difficult, just new to me; few were bizarre but that's compTIA for you. Good luck folks.
upvoted 6 times
...
Afel_Null
1 year, 6 months ago
This is the last free question available. This marks the end of my study. Wish me luck on tomorrow's exam brothers!
upvoted 7 times
ThaKyd88
1 year, 6 months ago
Good Luck and I hoped you pass!
upvoted 1 times
...
...
Afel_Null
1 year, 6 months ago
Selected Answer: D
Not how I'd define DLP, but it's the only option that actively monitors network. tcpreplay is used to clone tcp connection (replay attack), file integrity monitoring is not scanning networks, but files, honeynets are traps for malicious individuals.
upvoted 1 times
...
above
1 year, 7 months ago
Selected Answer: D
DLP is used to identify sensitive data and FIM is used to detect changes to those sensitive data and warn the security teams for a more robust security plan
upvoted 2 times
...
freyprey
1 year, 7 months ago
Selected Answer: D
FIM ( file integrity monitoring ) it doesn't check file types , instead checks file signatures or fingerprints. So THe correct answer is D, DLP.
upvoted 1 times
...
maggie22
1 year, 8 months ago
Answer is D. Data in motion: Ensuring the safe transmission of sensitive, confidential or proprietary data while it moves across the network through encryption and/or other e-mail and messaging security measures
upvoted 1 times
...
ja1092m
1 year, 8 months ago
Selected Answer: D
Most likely D. DLP is used to identify sensitive data and FIM is used to detect changes to those sensitive data and warn the security teams for a more robust security plan
upvoted 1 times
...
zits88
1 year, 8 months ago
Selected Answer: D
The answer is DLP. FIM is a "red herring" answer. The clue in the question comes from the word "file types." While, at the end of the day, FIM would check this as well, it is more specifically intended to check the inner composition of files rather than just their type. CompTIA isn't thinking as hard about this as some of the people on here, I don't think.
upvoted 2 times
...
andresalcedo
1 year, 9 months ago
Selected Answer: A
i'll go with A
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: D
DLP solutions are designed to detect and prevent the unauthorized transmission of sensitive or confidential data. They monitor network traffic in real-time and inspect the content of files to identify specific file types, such as PII (Personally Identifiable Information), credit card numbers, or classified information. When a matching file type is detected, DLP solutions can take various actions, such as blocking the transmission, alerting security personnel, or applying encryption measures.
upvoted 8 times
bolun
1 year, 9 months ago
DLP can detect and prevent when it said you can monitor?
upvoted 2 times
tonnage800
1 year, 6 months ago
monitoring is term of detection
upvoted 1 times
...
...
...
utrone
1 year, 11 months ago
Selected Answer: A
A: FIM is better in my understandings. The question is asking for a active monitoring solution. FIM is powerful to monitor files in network transmission. DLP is a solution to block the protected type when being transmitted but can not monitor the files those are being transmitted on the network.
upvoted 1 times
...
Exlr8me
2 years ago
Selected Answer: D
DLP solution is used monitor the traffic for any files the contain sensitive information
upvoted 1 times
...
Nick40
2 years, 1 month ago
Selected Answer: A
A. FIM
upvoted 2 times
...
sdc939
2 years, 2 months ago
D. DLP
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago