Exam SY0-601 All QuestionsBrowse all questions from this exam
Question 410

An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Choose two.)

    Correct Answer: D, E

    To prevent hackers from entering a facility and planting a remotely accessible device, the primary measures should focus on physical security. Access control vestibules provide a controlled entry point to the facility, ensuring that only authorized personnel can access the premises. Guards offer an additional layer of security by monitoring and intercepting unauthorized attempts to enter the facility. These measures stop potential intruders before they can physically access the network, making them the first lines of defense.

Discussion
[Removed]Options: CD

Guys, I'm going to have an exam tomorrow, I'm very nervous because my professional future depends on this result, but I have faith in God that everything will work out. Thank you all for your help here at ExamTopics.

[Removed]

Bro same. Mad nervous . I hope you passed! Please come back and update us.

Shermszn

Hey bro how did the test go? Did these questions cover the exam well?

[Removed]

Friends, I took the exam today and passed. Score = 769 The questions here covered about 50% of the exam, so my tip is: Focus on the questions and come up with your own answers, the exam might surprise you.

[Removed]

But all PBQs were on the exam. I apologize for the bad English, I'm using a translator.

RvR109

There are like 400 questions on this page, you don't maybe know which of the questions here are on the exam? I studied all 300 questions and now they added another 100, it's messing me up.

[Removed]

there 800 questions now.

rf18

congratulations and goodluck

NeoSam999

How did it go? Hope you passed!

RanaerOptions: DE

We are asked for the first line of defense. Not the most versatile, or best combination. What if we had it all, which ones would be the first two. Well we have to stop the adversaries from entering the facility of course. Access control vestibules and guards do this. Then we have the more technical solutions such as Mac filtering or NAC, but as I noted, we need to pick the two which would be our first line of defense.

BlackSpider

Those are the first lines of defense D. Physical Security and C. Information Security. D. Access Control Vestibules represent a physical security measure. By physically preventing unauthorized individuals from entering a facility, you add a first line of defense against any intrusions, including someone trying to plug in an unauthorized device. C. Network Access Control (NAC) is an information security measure. By controlling which devices can access the network based on predefined security postures, you add a digital line of defense to ensure that even if someone gets past the physical security, they can't just plug in a device and access the network. Together, they form the first lines of defense on both the physical and digital fronts.

JT4

Just passed the exam with a score of 800 on 10/28/23. About 90% of the questions are from here. This question is on the exam.

ComPCertOn

congrats, hat did you choose ?? u can see we have an issue here

cantbemeOptions: DE

My Answer....k.i.s.s

AspiringNerdOptions: DE

“Entering a facility”

BD69Options: DE

First line of defense: D & E A,B, & C are second lines of defense Bollards just prevent a vehicle from crashing in. Without them, if someone crashed in, they would be spotted immediately.

BD69Options: DE

The correct answer for the FIRST line of attack SHOULD be D & E, however, if they mean technical controls, then it's B & C. MAC filtering is pretty lame since it can be compromised in seconds.

6809276Options: DE

First line of defense should be even BEFORE reaching the server which will be D and E. A guard and access control.

EighthNotesOptions: DE

I choose DE because its asking for first line of defense before attacker can jack in a kali linux box, so i dont see why NAC would be necessary if a guard and vestibules are available options

12f1a9aOptions: CD

C and D are both physical controls and it is quite possible to perform social engineering so that the guard might let the attacker in. If this is a possibility then there has to be a technical control too which is NAC. So I go with NAC and vestibule

BD69

C is not a physical control

Froggy300Options: CD

You want both a physical control and a network control.

AbdullahMohammad251Options: DE

First line of defense: Implementing physical security measures. Second line of defense: Implementing technical security measures. First, you physically block the intruder from entering the facility using things like access control vestibules, fences, and security guards. If they bypass the physical security, we move to technical security, including MAC filtering and network access control.

EromonsOptions: BC

It talks about line of defence and also specify that the hacker used PLUGGING meaning a Deterrent and Preventive control should be put in place.

zecomeia_007Options: DE

First Line

EikanOptions: DE

D - Access Control Vestibules & E - Guards

ComicbookmanOptions: DE

The Question has Key giveaways, (concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box) They are walking into the facility Physically. The intent is to plug in a Laptop, A cellphone, rasberry pi, or tablet with kali. Then connecting physically. So you would require physical deterrents. Such as guards and Access control Vestibules. Don't overthink it and keep it simple. D and E.

Comicbookman

A second line of defence to add is (NAC) is a technique that restricts access to a network based on the identity, role, device, location, or other criteria of the users or devices. But the Initial applies as stopping the One way in and one way out physical entry. A concern for Insider threat would be to apply NAC. But that would be already in play before hand for the Network.

MortG7Options: DE

hackers potentially entering a facility--> think physical entry DE