Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 431:

    A company wants the ability to restrict web access and monitor the websites that employees visit. Which of the following would BEST meet these requirements?

    A. internet proxy

    B. VPN

    C. WAF

    D. Firewall

  • Question 432:

    A security architect is required to deploy to conference rooms some workstations that will allow sensitive data to be displayed on large screens. Due to the nature of the data, it cannot be stored in the conference rooms. The fiieshare is located in a local data center. Which of the following should the security architect recommend to BEST meet the requirement?

    A. Fog computing and KVMs

    B. VDI and thin clients

    C. Private cloud and DLP

    D. Full drive encryption and thick clients

  • Question 433:

    A security engineer is deploying a new wireless for a company. The company shares office space with multiple tenants. Which of the following should the engineer configured on the wireless network to ensure that confidential data is not exposed to unauthorized users?

    A. EAP

    B. TLS

    C. HTTPS

    D. AES

  • Question 434:

    An attacker browses a company's online job board attempting to find any relevant information regarding the technologies the company uses. Which of the following BEST describes this social engineering technique?

    A. Hoax

    B. Reconnaissance

    C. Impersonation

    D. pretexting

  • Question 435:

    A company's security team received notice of a critical vulnerability affecting a high-profile device within the web infrastructure. The vendor patch was just made available online but has not yet been regression tested in development environments. In the interim, firewall rules were implemented to reduce the access to the interface affected by the vulnerability. Which of the following controls does this scenario describe?

    A. Deterrent

    B. Compensating

    C. Detective

    D. Preventive

  • Question 436:

    Which of the following is a targeted attack aimed at compromising users within a specific industry or group?

    A. Watering hole

    B. Typosquatting

    C. Hoax

    D. Impersonation

  • Question 437:

    An attacker has determined the best way to impact operations is to infiltrate third-party software vendors. Which of the following vectors is being exploited?

    A. Social media

    B. Cloud

    C. Supply chain

    D. Social engineering

  • Question 438:

    A security analyst has identified malware spreading through the corporate network and has activated the CSIRT Which of the following should the analyst do NEXT?

    A. Review how the malware was introduced to the network.

    B. Attempt to quarantine all infected hosts to limit further spread.

    C. Create help desk tickets to get infected systems reimaged.

    D. Update all endpoint antivirus solutions with the latest updates.

  • Question 439:

    Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?

    A. A phishing email stating a cash settlement has been awarded but will expire soon

    B. A smishing message stating a package is scheduled for pickup

    C. A vishing call that requests a donation be made to a local charity

    D. A SPIM notification claiming to be undercover law enforcement investigating a cybercrime

  • Question 440:

    An analyst receives multiple alerts for beaconing activity for a host on the network, After analyzing the activity, the analyst observes the following activity:

    1.

    A user enters comptia.org into a web browser.

    2.

    The website that appears is not the comptia.org site.

    3.

    The website is a malicious site from the attacker.

    4.

    Users in a different office are not having this issue.

    Which of the following types of attacks was observed?

    A. On-path attack

    B. DNS poisoning

    C. Locator (URL) redirection

    D. Domain hijacking

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.