Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 1061:

    Which of the following types of attacks is specific to the individual it targets?

    A. Whaling

    B. Pharming

    C. Smishing

    D. Credential harvesting

  • Question 1062:

    A security analyst needs to complete an assessment. The analyst is logged into a server and must use native tools to map services running on it to the server's listening ports. Which of the following tools can BEST accomplish this talk?

    A. Netcat

    B. Netstat

    C. Nmap

    D. Nessus

  • Question 1063:

    During a routine scan of a wireless segment at a retail company, a security administrator discovers several devices are connected to the network that do not match the company's naming convention and are not in the asset Inventory. WiFi access Is protected with 255-Wt encryption via WPA2. Physical access to the company's facility requires two-factor authentication using a badge and a passcode

    Which of the following should the administrator implement to find and remediate the Issue? (Select TWO).

    A. Check the SIEM for failed logins to the LDAP directory.

    B. Enable MAC filtering on the switches that support the wireless network.

    C. Run a vulnerability scan on all the devices in the wireless network

    D. Deploy multifactor authentication for access to the wireless network

    E. Scan the wireless network for rogue access points.

    F. Deploy a honeypot on the network

  • Question 1064:

    An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?

    A. Incremental backups Monday through Friday at 6:00 p.m and differential backups hourly

    B. Full backups Monday through Friday at 6:00 p.m and incremental backups hourly.

    C. incremental backups Monday through Friday at 6:00 p.m and full backups hourly.

    D. Full backups Monday through Friday at 6:00 p.m and differential backups hourly.

  • Question 1065:

    A RAT that was used to compromise an organization's banking credentials was found on a user's computer.

    The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would BEST prevent this from reoccurring?

    A. Create a new acceptable use policy.

    B. Segment the network into trusted and untrusted zones.

    C. Enforce application whitelisting.

    D. Implement DLP at the network boundary

  • Question 1066:

    Which of the following would be BEST to establish between organizations to define the responsibilities of each party outline the key deliverables and include monetary penalties for breaches to manage third-party risk?

    A. An ARO

    B. An MOU

    C. An SLA

    D. A BPA

  • Question 1067:

    A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. Which of the following should the analyst implement to authenticate the entire packet?

    A. AH

    B. ESP

    C. SRTP

    D. LDAP

  • Question 1068:

    A network administrator needs to build out a new datacenter, with a focus on resiliency and uptime. Which of the following would BEST meet this objective? (Choose two.)

    A. Dual power supply

    B. Off-site backups

    C. Automatic OS upgrades

    D. NIC teaming

    E. Scheduled penetration testing

    F. Network-attached storage

  • Question 1069:

    After a ransomware attack a forensics company needs to review a cryptocurrency transaction between the victim and the attacker. Which of the following will the company MOST likely review to trace this transaction?

    A. The public ledger

    B. The NetFlow data

    C. A checksum

    D. The event log

  • Question 1070:

    When selecting a technical solution for identity management, an architect chooses to go from an in-house to a third-party SaaS provider. Which of the following risk management strategies is this an example of?

    A. Acceptance

    B. Mitigation

    C. Avoidance

    D. Transference

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.