Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 1041:

    A user contacts the help desk to report the following:

    1.

    Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID.

    2.

    This had never happened before, but the user entered the information as requested.

    3.

    The user was able to access the Internet but had trouble accessing the department share until the next day.

    4.

    The user is now getting notifications from the bank about unauthorized transactions.

    Which of the following attack vectors was MOST likely used in this scenario?

    A. Rogue access point

    B. Evil twin

    C. DNS poisoning

    D. ARP poisoning

  • Question 1042:

    The process of passively gathering information poor to launching a cyberattack is called:

    A. tailgating

    B. reconnaissance

    C. pharming

    D. prepending

  • Question 1043:

    An organization's Chief Security Officer (CSO) wants to validate the business's involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO MOST likely use?

    A. An external security assessment

    B. A bug bounty program

    C. A tabletop exercise

    D. A red-team engagement

  • Question 1044:

    Rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?

    A. Configure the perimeter firewall to deny inbound external connections to SMB ports.

    B. Ensure endpoint detection and response systems are alerting on suspicious SMB connections.

    C. Deny unauthenticated users access to shared network folders.

    D. Verify computers are set to install monthly operating system, updates automatically

  • Question 1045:

    A large industrial system's smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs the company's security manager notices the generator's IP is sending packets to an internal file server's IP.

    Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?

    A. Segmentation

    B. Firewall whitelisting

    C. Containment D. isolation

  • Question 1046:

    A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated customers.

    Prior to releasing specific threat intelligence to other paid subscribers, the organization is MOST likely obligated by contracts to:

    A. perform attribution to specific APTs and nation-state actors.

    B. anonymize any PII that is observed within the IoC data.

    C. add metadata to track the utilization of threat intelligence reports.

    D. assist companies with impact assessments based on the observed data

  • Question 1047:

    Accompany has a flat network that is deployed in the cloud. Security policy states that all production and development servers must be segmented. Which of the following should be used to design the network to meet the security requirements?

    A. CASB

    B. VPC

    C. Perimeter network

    D. WAF

  • Question 1048:

    A security engineer has enabled two-factor authentication on all workstations. Which of the following approaches are the MOST secure? (Select TWO).

    A. Password and security question

    B. Password and CAPTCHA

    C. Password and smart card

    D. Password and fingerprint

    E. Password and one-time token

    F. Password and voice

  • Question 1049:

    A security administrator checks the table of a network switch, which shows the following output:

    Which of the following is happening to this switch?

    A. MAC Flooding

    B. DNS poisoning

    C. MAC cloning

    D. ARP poisoning

  • Question 1050:

    An attacked is attempting to exploit users by creating a fake website with the URL www.validwebsite.com.

    The attacker's intent is to imitate the look and feel of a legitimate website to obtain personal information from unsuspecting users.

    Which of the following social-engineering attacks does this describe?

    A. Information elicitation

    B. Type squatting

    C. Impersonation

    D. Watering-hole attack

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.