Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Jul 04, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 811:

    Which of the following would satisfy three-factor authentication?

    A. Password, retina scanner, and NFC card

    B. Password, fingerprint scanner, and retina scanner

    C. Password, hard token, and NFC card

    D. Fingerpnint scanner, hard token, and retina scanner

  • Question 812:

    An application owner has requested access for an external application to upload data from the central internal website without providing credentials at any point. Which of the following authentication methods should be configured to allow this type of integration access?

    A. OAuth

    B. SSO

    C. TACACS+

    D. Kerberos

  • Question 813:

    A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected.

    Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads.

    Which of the following BEST describe this type of attack? (Choose two.)

    A. DoS

    B. SSL stripping

    C. Memory leak

    D. Race condition

    E. Shimming

    F. Refactoring

  • Question 814:

    Which of the following policies establishes rules to measure third-party work tasks and ensure deliverables are provided within a specific time line?

    A. SLA

    B. MOU

    C. AUP

    D. NDA

  • Question 815:

    Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company's final software releases? (Select TWO.)

    A. Unsecure protocols

    B. Use of penetration-testing utilities

    C. Weak passwords

    D. Included third-party libraries

    E. Vendors/supply chain

    F. Outdated anti-malware software

  • Question 816:

    The SOC is reviewing process and procedures after a recent incident. The review indicates it took more than 30 minutes to determine that quarantining an infected host was the best course of action. The allowed the malware to spread to additional hosts before it was contained. Which of the following would be BEST to improve the incident response process?

    A. Updating the playbooks with better decision points

    B. Dividing the network into trusted and untrusted zones

    C. Providing additional end-user training on acceptable use

    D. Implementing manual quarantining of infected hosts

  • Question 817:

    A financial organization has adopted a new secure, encrypted document-sharing application to help with its customer loan process. Some important PII needs to be shared across this new platform, but it is getting blocked by the DLP systems. Which of the following actions will BEST allow the PII to be shared with the secure application without compromising the organization's security posture?

    A. Configure the DLP policies to allow all PII

    B. Configure the firewall to allow all ports that are used by this application

    C. Configure the antivirus software to allow the application

    D. Configure the DLP policies to whitelist this application with the specific PII

    E. Configure the application to encrypt the PII

  • Question 818:

    A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to determine the issue? (Choose two.)

    A. Perform a site survey

    B. Deploy an FTK Imager

    C. Create a heat map

    D. Scan for rogue access points

    E. Upgrade the security protocols

    F. Install a captive portal

  • Question 819:

    A Chief Executive Officer's (CEO) personal information was stolen in a social engineering attack. Which of the following sources would reveal if the CEO's personal information is for sale?

    A. Automated information sharing

    B. Open-source intelligence

    C. The dark web

    D. Vulnerability databases

  • Question 820:

    A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company's network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst discovers the following:

    Which of the following attacks MOST likely occurred?

    A. Dictionary

    B. Credential-stuffing

    C. Password-spraying

    D. Brute-forcea

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.