Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 441:

    Which of the following are the BEST ways to implement remote home access to a company's intranet systems if establishing an always-on VPN is not an option? (Select Two)

    A. Install VPN concentrations at home offices

    B. Create NAT on the firewall for intranet systems

    C. Establish SSH access to a jump server

    D. Implement a SSO solution

    E. Enable MFA for intranet systems

    F. Configure SNMPv3 server and clients.

  • Question 442:

    A systems analyst is responsible for generating a new digital forensics chain-of-custody form. Which of the following should the analyst include in this documentation? (Select TWO).

    A. The order of volatility

    B. A CRC32 checksum

    C. The provenance of the artifacts

    D. The vendor's name

    E. The date time

    F. A warning banner

  • Question 443:

    During a recent security assessment, a vulnerability was found in a common OS, The OS vendor was unaware of the issue and promised to release a patch within next quarter, Which of the following BEST describes this type of vulnerability?

    A. Legacy operating system

    B. Weak configuration

    C. Zero day

    D. Supply chain

  • Question 444:

    Which of the following prevents an employee from seeing a colleague who is visiting an inappropriate website?

    A. Job rotation policy

    B. NDA

    C. AUP

    D. Separation Of duties policy

  • Question 445:

    Which of the following documents provides guidance regarding the recommended deployment of network security systems from the manufacturer?

    A. Cloud control matrix

    B. Reference architecture

    C. NIST RMF

    D. CIS Top 20

  • Question 446:

    A security engineer is building a file transfer solution to send files to a business partner. The users would like to drop off the files in a specific directory and have the server send to the business partner. The connection to the business partner is over the internet and needs to be secure. Which of the following can be used?

    A. S/MIME

    B. LDAPS

    C. SSH

    D. SRTP

  • Question 447:

    After a recent external audit, the compliance team provided a list of several non-compliant, in-scope hosts that were not encrypting cardholder data at rest, Which of the following compliance frameworks would address the compliance team's GREATEST concern?

    A. PCI DSS

    B. GDPR

    C. ISO 27001

    D. NIST CSF

  • Question 448:

    A company is moving its retail website to a public cloud provider. The company wants to tokenize credit card data but not allow the cloud provider to see the stored credit card information. Which of the following would BEST meet these objectives?

    A. WAF

    B. CASB

    C. VPN

    D. TLS

  • Question 449:

    A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements?

    A. Reverse proxy

    B. Automated patch management

    C. Snapshots

    D. NIC teaming

  • Question 450:

    A forensics investigator is examining a number of unauthorized payments the were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be:

    Click here to unsubscribe

    Which of the following will the forensics investigator MOST likely determine has occurred?

    A. SQL injection

    B. CSRF

    C. XSS

    D. XSRF

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.