Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 451:

    A research company discovered that an unauthorized piece of software has been detected on a small number of machines in its lab. The researchers collaborate with other machines using port 445 and on the Internet using port 443. The unauthorized software is starting to be seen on additional machines outside of the lab and is making outbound communications using HTTPS and SMB. The security team has been instructed to resolve the problem as quickly as possible causing minimal disruption to the researchers.

    Which of the following contains the BEST course of action in this scenario?

    A. Update the host firewalls to block outbound SMB.

    B. Place the machines with the unapproved software in containment.

    C. Place the unauthorized application in a blocklist.

    D. Implement a content filter to block the unauthorized software communication.

  • Question 452:

    Which of the following processes will eliminate data using a method that will allow the storage device to be reused after the process is complete?

    A. Pulverizing

    B. Overwriting

    C. Shredding

    D. Degaussing

  • Question 453:

    The Chief Information Security Officer (CISO) of a bank recently updated the incident response policy. The CISO is concerned that members of the incident response team do not understand their roles. The bank wants to test the policy but with the least amount of resources or impact. Which of the following BEST meets the requirements?

    A. Warm site failover

    B. Tabletop walk-through

    C. Parallel path testing

    D. Full outage simulation

  • Question 454:

    Which of the following secure coding techniques makes compromised code more difficult for hackers to use?

    A. Obfuscation

    B. Normalization

    C. Execution

    D. Reuse

  • Question 455:

    Which of the following is the BEST action to foster a consistent and auditable incident response process?

    A. Incent new hires to constantly update the document with external knowledge.

    B. Publish the document in a central repository that is easily accessible to the organization.

    C. Restrict eligibility to comment on the process to subject matter experts of each IT silo.

    D. Rotate CIRT members to foster a shared responsibility model in the organization.

  • Question 456:

    Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?

    A. DLP

    B. NIDS

    C. TPM

    D. FDE

  • Question 457:

    Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?

    A. Hashing

    B. Tokenization

    C. Masking

    D. Encryption

  • Question 458:

    Two hospitals merged into a single organization. The privacy officer requested a review of all records to ensure encryption was used during record storage, in compliance with regulations. During the review, the officer discovered thai medical diagnosis codes and patient names were left unsecured. Which of the following types of data does this combination BEST represent?

    A. Personal health information

    B. Personally Identifiable Information

    C. ToKenized data

    D. Proprietary data

  • Question 459:

    During an incident response process involving a laptop, a host was identified as the entry point for malware. The management team would like to have the laptop restored and given back to the user. The cybersecurity analyst would like to continue investigating the intrusion on the host. Which of the following would allow the analyst to continue the investigation and also return the laptop to the user as soon as possible?

    A. dd

    B. memdump

    C. tcpdump

    D. head

  • Question 460:

    An audit Identified Pll being utilized In the development environment of a critical application. The Chief Privacy Officer (CPO) Is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?

    A. Data anonymlzallon

    B. Data encryption

    C. Data masking

    D. Data tokenization

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.