Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 361:

    An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?

    A. Perform a mathematical operation on the passwords that will convert them into umgue stnngs

    B. Add extra data to the passwords so their length is increased, making them harder to brute force

    C. Store all passwords in the system in a rainbow table that has a centralized location

    D. Enforce the use of one-time passwords that are changed for every login session.

  • Question 362:

    An organization discovered files with proprietary financial data have been deleted. The files have been recovered from backup but every time the Chief Financial Officer logs in to the file server, the same files are deleted again No other users are experiencing this issue. Which of the following types of malware is MOST likely causing this behavior?

    A. Logic bomb

    B. Crypto malware

    C. Spyware

    D. Remote access Trojan

  • Question 363:

    Two organizations plan to collaborate on the evaluation of new SIEM solutions for their respective companies. A combined effort from both organizations' SOC teams would speed up the effort. Which of the following can be written to document this agreement?

    A. MOU

    B. ISA

    C. SLA

    D. NDA

  • Question 364:

    The SOC for a large MSSP is meeting to discuss the lessons learned from a recent incident that took much too long to resolve This type of incident has become more common in recent weeks and is consuming large amounts of the analysts' time due to manual tasks being performed Which of the following solutions should the SOC consider to BEST improve its response time?

    A. Configure a NIDS appliance using a Switched Port Analyzer

    B. Collect OSINT and catalog the artifacts in a central repository

    C. Implement a SOAR with customizable playbooks

    D. Install a SIEM with community-driven threat intelligence

  • Question 365:

    An engineer wants to inspect traffic to a cluster of web servers in a cloud environment. Which of the following solutions should the engineer implement?

    A. CASB

    B. WAF

    C. Load balancer

    D. VPN

  • Question 366:

    An organization is migrating several SaaS applications that support SSO. The security manager wants to ensure the migration is completed securely. Which of the following should the organization consider before implementation? (Select TWO).

    A. The back-end directory source

    B. The identity federation protocol

    C. The hashing method

    D. The encryption method

    E. The registration authority

    F. The certificate authority

  • Question 367:

    Which of the following tools is effective in preventing a user from accessing unauthorized removable media?

    A. USB data blocker

    B. Faraday cage

    C. Proximity reader

    D. Cable lock

  • Question 368:

    Which of the following is a known security risk associated with data archives that contain financial information?

    A. Data can become a liability if archived longer than required by regulatory guidance

    B. Data must be archived off-site to avoid breaches and meet business requirements

    C. Companies are prohibited from providing archived data to e-discovery requests

    D. Unencrypted archives should be preserved as long as possible and encrypted

  • Question 369:

    An organization would like to give remote workers the ability to use applications hosted inside the corporate network Users will be allowed to use their personal computers or they will be provided organization assets Either way no data or applications will be installed locally on any user systems

    Which of the following mobile solutions would accomplish these goals?

    A. VDI

    B. MDM

    C. COPE

    D. UTM

  • Question 370:

    A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL. https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?

    A. On-path

    B. Domain hijacking

    C. DNS poisoning

    D. Evil twin

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.