Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Jul 04, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 741:

    A security analyst needs to generate a server certificate to be used for 802.1X and secure RDP connections. The analyst is unsure what is required to perform the task and solicits help from a senior colleague. Which of the following is the FIRST step the senior colleague will most likely tell the analyst to perform to accomplish this task?

    A. Create an OCSP

    B. Generate a CSR

    C. Create a CRL

    D. Generate a .pfx file

  • Question 742:

    A user downloaded an extension for a browser, and the user's device later became infected. The analyst who is investigating the incident saw various logs where the attacker was hiding activity by deleting data. The following was observed

    running:

    New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -DriveLetter C - FileSystemLabel "New"-FileSystem NTFS - Full -Force -Confirm:$false |

    Which of the following is the malware using to execute the attack?

    A. PowerShell

    B. Python

    C. Bash

    D. Macros

  • Question 743:

    An organization's help desk is flooded with phone calls from users stating they can no longer access certain websites. The help desk escalates the issue to the security team, as these websites were accessible the previous day. The security analysts run the following command: ipconfig /flushdns, but the issue persists. Finally, an analyst changes the DNS server for an impacted machine, and the issue goes away. Which of the following attacks MOST likely occurred on the original DNS server?

    A. DNS cache poisoning

    B. Domain hijacking

    C. Distributed denial-of-service

    D. DNS tunneling

  • Question 744:

    A security administrator needs to create a RAID configuration that is focused on high read/write speeds and fault tolerance. It is unlikely that multiple drives will fail simultaneously. Which of the following RAID configurations should the administrator use?

    A. RA1D 0

    B. RAID1

    C. RAID 5

    D. RAID 10

  • Question 745:

    A security engineer is reviewing log files after a third discovered usernames and passwords for the organization's accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?

    A. Man-in- the middle

    B. Spear-phishing

    C. Evil twin

    D. DNS poising

  • Question 746:

    A company wants to deploy decoy systems alongside production systems in order to entice threat actors and to learn more about attackers. Which of the following BEST describes these systems?

    A. DNS sinkholes

    B. Hafieypots

    C. Virtual machines

    D. Neural networks

  • Question 747:

    A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing?

    A. Developing an incident response plan

    B. Building a disaster recovery plan

    C. Conducting a tabletop exercise

    D. Running a simulation exercise

  • Question 748:

    An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

    A. Incident response

    B. Communications

    C. Disaster recovery

    D. Data retention

  • Question 749:

    A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS. Which of the following must be part of the security architecture to achieve AAA? (Select TWO)

    A. DNSSEC

    B. Reverse proxy

    C. VPN concentrator

    D. PKI

    E. Active Directory

    F. RADIUS

  • Question 750:

    Which of the following are requirements that must be configured for PCI DSS compliance? (Select TWO).

    A. Testing security systems and processes regularly

    B. Installing and maintaining a web proxy to protect cardholder data

    C. Assigning a unique ID to each person with computer access

    D. Encrypting transmission of cardholder data across private networks

    E. Benchmarking security awareness training for contractors

    F. Using vendor-supplied default passwords for system passwords

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.