Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 331:

    After a recent security breach a security analyst reports that several admimstratrve usemames and passwords are being sent via cieartext across the network to access network devices over prot 23 Which of the following should be implemented so all credentials sent over the network are encrypted when remotely accessing and configunng network devices?

    A. SSH

    B. SNMPv3

    C. SFTP

    D. Telnet

    E. FTP

  • Question 332:

    Field workers in an organization are issued mobile phones on a daily basis All the work is performed within one city and the mobile phones are not used for any purpose other than work The organization does not want these pnones used for personal purposes. The organization would like to issue the phones to workers as permanent devices so the pnones do not need to be reissued every day Qven the conditions described, which of the following technologies would BEST meet these requirements'

    A. Geofencing

    B. Mobile device management

    C. Containenzation

    D. Remote wiping

  • Question 333:

    Which of the following provides a calculated value for known vulnerabilities so organizations can prioritize mitigation steps?

    A. CVSS

    B. SIEM

    C. SOAR

    D. CVE

  • Question 334:

    Which of the following employee roles is responsible for protecting an organization's collected personal information?

    A. CTO

    B. DPO

    C. CEO

    D. DBA

  • Question 335:

    A security analyst is receiving numerous alerts reporting that the response time of an internet-facing application has been degraded However, the internal network performance was not degraded. Which of the following MOST likely explains this behavior?

    A. DNS poisoning

    B. MAC flooding

    C. DDoS attack

    D. ARP poisoning

  • Question 336:

    Which of the following terms describes a broad range of information that is sensitive to a specific organization?

    A. Public

    B. Top secret

    C. Proprietary

    D. Open-source

  • Question 337:

    A systems administrator reports degraded performance on a virtual server. The administrator increases the virtual memory allocation, which improves conditions, but performance degrades again after a few days.

    The administrator runs an analysis tool and sees the following output:

    ==3214== timeAttend.exe analyzed

    ==3214== ERROR SUMMARY:

    ==3214== malloc/free: in use at exit: 4608 bytes in 18 blocks.

    ==3214== checked 82116 bytes

    ==3214== definitely lost: 4608 bytes in 18 blocks.

    The administrator terminates the timeAttend.exe, observes system performance over the next few days, and notices that the system performance does not degrade.

    Which of the following issues is MOST likely occurring?

    A. DLL injection

    B. API attack

    C. Buffer oveiflow

    D. Memory leak

  • Question 338:

    A report delivered to the Chief Information Security Officer (CISO) shows that some user credentials could be exfilltrated. The report also indicates that users tend to choose the same credentials on different systems and applications. Which of the following policies should the CISO use to prevent someone from using the exfilltrated credentials?

    A. MFA

    B. Lockout

    C. Time-based logins

    D. Password history

  • Question 339:

    An IT manager is estimating the mobile device budget for the upcoming year Over the last five years, the number of devices that were replaced due to loss damage or theft steadily increased by 10%. Which of the following would BEST describe the estimated number of devices to be replaced next year?

    A. ALE

    B. ARO

    C. RPO

    D. SLE

  • Question 340:

    An organization has activated an incident response plan due to a malware outbreak on its network The organization has brought in a forensics team that has identified an internet- facing Windows server as the likely point of initial compromise The malware family that was detected is known to be distributed by manually logging on to servers and running the malicious code Which of the following actions would be BEST to prevent reinfection from the initial infection vector?

    A. Prevent connections over TFTP from the internal network

    B. Create a firewall rule that blocks port 22 from the internet to the server

    C. Disable file shanng over port 445 to the server

    D. Block port 3389 inbound from untrusted networks

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.