Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :May 09, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 481:

    A company is under investigation for possible fraud. As part of the investigation. the authorities need to review all emails and ensure data is not deleted. Which of the following should the company implement to assist in the investigation?

    A. Legal hold

    B. Chain of custody

    C. Data loss prevention

    D. Content filter

  • Question 482:

    Which of the following is a policy that provides a greater depth of knowldge across an organization?

    A. Asset manahement policy

    B. Separation of duties policy

    C. Acceptable use policy

    D. Job Rotation policy

  • Question 483:

    A company wants to build a new website to sell products online. The website will host a storefront application that will allow visitors to add products to a shopping cart and pay for the products using a credit card. Which of the following protocols would be the MOST secure to implement?

    A. SSL

    B. FTP

    C. SNMP

    D. TLS

  • Question 484:

    An untrusted SSL certificate was discovered during the most recent vulnerability scan. A security analyst determines the certificate is signed properly and is a valid wildcard. This same certificate is installed on other company servers without issue.

    Which of the following is the MOST likely reason for this finding?

    A. The required intermediate certificate is not loaded as part of the certificate chain.

    B. The certificate is on the CRL and is no longer valid.

    C. The corporate CA has expired on every server, causing the certificate to fail verification.

    D. The scanner is incorrectly configured to not trust this certificate when detected on the server.

  • Question 485:

    A large financial services firm recently released information regarding a security breach within its corporate network that began several years before. During the time frame in which the breach occurred, indicators show an attacker gained administrative access to the network through a file downloaded from a social media site and subsequently installed it without the user's knowledge. Since the compromise, the attacker was able to take command and control the computer systems anonymously while obtaining sensitive corporate and personal employee information.

    Which of the following methods did the attacker MOST likely use to gain access?

    A. A bot

    B. A fileless virus

    C. A logic bomb

    D. A RAT

  • Question 486:

    A company is required to continue using legacy software to support a critical service. Which of the following BEST explains a risk of this practice?

    A. Default system configuration

    B. Unsecure protocols

    C. Lack of vendor support

    D. Weak encryption

  • Question 487:

    A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output:

    Which of the following is the router experiencing?

    A. DDoS attack

    B. Memory leak

    C. Buffer overflow

    D. Resource exhaustion

  • Question 488:

    A cyber-security administrator is using an enterprise firewall. The administrator created some rules, but now Seems to be unresponsive. All connections being dropped by the firewall. Which of the following would be the BEST option to remove the rules?

    A. # iptables -t mangle -x

    B. # iptables -f

    C. # iptables -z

    D. # iptables -p input -j drop

  • Question 489:

    An organization just implemented a new security system. Local laws state that citizens must be notified prior to encountering the detection mechanism to deter malicious activities. Which of the following is being implemented?

    A. Proximity cards with guards

    B. Fence with electricity

    C. Drones with alarms

    D. Motion sensors with signage

  • Question 490:

    A company has a flat network in the cloud. The company needs to implement a solution to segment its production and non-production servers without migrating servers to a new network. Which of the following solutions should the company implement?

    A. internet

    B. Screened Subnet

    C. VLAN segmentation

    D. Zero Trust

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.