Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 1031:

    Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

    A. SSAE SOC 2

    B. PCI DSS

    C. GDPR

    D. ISO 31000

  • Question 1032:

    Which of the following algorithms has the SMALLEST key size?

    A. DES

    B. Twofish

    C. RSA

    D. AES

  • Question 1033:

    A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?

    A. Predictability

    B. Key stretching

    C. Salting

    D. Hashing

  • Question 1034:

    Administrators have allowed employees to access their company email from personal computers. However, the administrators are concerned that these computers are another attack

    Surface and can result in user accounts being breached by foreign actors. Which of the following actions would provide the MOST secure solution?

    A. Enable an option in the administration center so accounts can be locked if they are accessed from different geographical areas.

    B. Implement a 16-character minimum length and 30-day expiration password policy.

    C. Set up a global mail rule to disallow the forwarding of any company email to email addresses outside the organization,

    D. Enforce a policy that allows employees to be able to access their email only while they are connected to the Internet via VPN.

  • Question 1035:

    A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP. Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?

    A. Segmentation

    B. Firewall whitelisting

    C. Containment

    D. isolation

  • Question 1036:

    A security team received the following requirements for a new BYOD program that will allow employees to use personal smartphones to access business email:

    1.

    Sensitive customer data must be safeguarded.

    2.

    Documents from managed sources should not be opened in unmanaged destinations.

    3.

    Sharing of managed documents must be disabled.

    4.

    Employees should not be able to download emailed images to their devices.

    5.

    Personal photos and contact lists must be kept private.

    6.

    IT must be able to remove data from lost/stolen devices or when an employee no longer works for the company.

    Which of the following are the best features to enable to meet these requirements? (Choose two.)

    A. Remote wipe

    B. VPN connection

    C. Biometric authentication

    D. Device location tracking

    E. Geofencing

    F. Application approve list

    G. Containerization

  • Question 1037:

    A company wants to begin taking online orders for products but has decided to outsource payment processing to limit risk. Which of the following best describes what the company should request from the payment processor?

    A. ISO 27001 certification documents

    B. Proof of PCI DSS compliance

    C. A third-party SOC 2 Type 2 report

    D. Audited GDPR policies

  • Question 1038:

    An employee in the accounting department receives an email containing a demand for payment for services performed by a vendor. However, the vendor is not in the vendor management database. Which of the following is this scenario an example of?

    A. Pretexting

    B. Impersonation

    C. Ransomware

    D. Invoice scam

  • Question 1039:

    An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

    A. The theft of portable electronic devices

    B. Geotagging in the metadata of images

    C. Bluesnarfing of mobile devices

    D. Data exfiltration over a mobile hot-spot

  • Question 1040:

    An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance's vulnerable state?

    A. The system was configured with weak default security settings.

    B. The device uses weak encryption ciphers.

    C. The vendor has not supplied a patch for the appliance.

    D. The appliance requires administrative credentials for the assessment

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.