Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Jul 04, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 821:

    A global pandemic is forcing a private organization to close some business units and reduce staffing at others. Which of the following would be BEST to help the organization's executives determine the next course of action?

    A. An incident response plan

    B. A communications plan

    C. A disaster recovery plan

    D. A business continuity plan

  • Question 822:

    A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges from the OS in both executable and data files and can work in conjunction with proxies or UTM. Which of the following would BEST meet the CSO's requirements?

    A. Fuzzing

    B. Sandboxing

    C. Static code analysis

    D. Code review

  • Question 823:

    In which of the following situations would it be BEST to use a detective control type for mitigation?

    A. A company implemented a network load balancer to ensure 99.999% availability of its web application.

    B. A company designed a backup solution to increase the chances of restoring services in case of a natural disaster.

    C. A company purchased an application-level firewall to isolate traffic between the accounting department and the information technology department.

    D. A company purchased an IPS system, but after reviewing the requirements, the appliance was supposed to monitor, not block, any traffic.

    E. A company purchased liability insurance for flood protection on all capital assets.

  • Question 824:

    A security modern may have occurred on the desktop PC of an organization's Chief Executive Officer (CEO) A duplicate copy of the CEO's hard drive must be stored securely to ensure appropriate forensic processes and the chain of custody are followed. Which of the following should be performed to accomplish this task?

    A. Install a new hard drive in the CEO's PC, and then remove the old hard drive and place it in a tamper-evident bag

    B. Connect a write blocker to the hard drive Then leveraging a forensic workstation, utilize the dd command m a live Linux environment to create a duplicate copy

    C. Remove the CEO's hard drive from the PC, connect to the forensic workstation, and copy all the contents onto a remote fileshare while the CEO watches

    D. Refrain from completing a forensic analysts of the CEO's hard drive until after the incident is confirmed, duplicating the hard drive at this stage could destroy evidence

  • Question 825:

    A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?

    A. Open the document on an air-gapped network

    B. View the document's metadata for origin clues

    C. Search for matching file hashes on malware websites

    D. Detonate the document in an analysis sandbox

  • Question 826:

    A company uses wireless tor all laptops and keeps a very detailed record of its assets, along with a comprehensive list of devices that are authorized to be on the wireless network. The Chief Information Officer (CIO) is concerned about a script kiddie potentially using an unauthorized device to brute force the wireless PSK and obtain access to the internal network. Which of the following should the company implement to BEST prevent this from occurring?

    A. A BPDU guard

    B. WPA-EAP

    C. IP filtering

    D. A WIDS

  • Question 827:

    A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?

    A. Nmapn

    B. Heat maps

    C. Network diagrams

    D. Wireshark

  • Question 828:

    A company recently experienced a data breach and the source was determined to be an executive who was charging a phone in a public area. Which of the following would MOST likely have prevented this breach?

    A. A firewall

    B. A device pin

    C. A USB data blocker

    D. Biometrics

  • Question 829:

    During an intemal penetration test, a security analyst identified a network device that had accepted cleartext authentication and was configured with a default credential. Which of the following recommendations should the security analyst make to secure this device?

    A. Configure SNMPv1.

    B. Configure SNMPv2c

    C. Configure SNMPv3.

    D. Configure the default community string.

  • Question 830:

    To secure an application after a large data breach, an e-commerce site will be resetting all users' credentials. Which of the following will BEST ensure the site's users are not compromised after the reset?

    A. A password reuse policy

    B. Account lockout after three failed attempts

    C. Encrypted credentials in transit

    D. A geofencing policy based on login history

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.