Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Jun 02, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 871:

    The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve in the environment patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have been provided to frontline staff, and a risk analysis has not been performed. Which of the following is the MOST likely cause of the CRO's concerns?

    A. SSO would simplify username and password management, making it easier for hackers to pass guess accounts.

    B. SSO would reduce password fatigue, but staff would still need to remember more complex passwords.

    C. SSO would reduce the password complexity for frontline staff.

    D. SSO would reduce the resilience and availability of system if the provider goes offline.

  • Question 872:

    The manager who is responsible for a data set has asked a security engineer to apply encryption to the data on a hard disk. The security engineer is an example of a:

    A. data controller.

    B. data owner

    C. data custodian.

    D. data processor

  • Question 873:

    Which of the following BEST describes a social-engineering attack that relies on an executive at a small business visiting a fake banking website where credit card and account details are harvested?

    A. Whaling

    B. Spam

    C. Invoice scam

    D. Pharming

  • Question 874:

    Which of the following describes the BEST approach for deploying application patches?

    A. Apply the patches to systems in a testing environment then to systems in a staging environment, and finally to production systems.

    B. Test the patches in a staging environment, develop against them in the development environment, and then apply them to the production systems

    C. Test the patches m a test environment apply them to the production systems and then apply them to a staging environment

    D. Apply the patches to the production systems apply them in a staging environment, and then test all of them in a testing environment

  • Question 875:

    Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?

    A. RTO

    B. MTBF

    C. MTTR

    D. RPO

  • Question 876:

    A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business Which of the following constraints BEST describes the reason the findings cannot be remediated?

    A. inability to authenticate

    B. Implied trust

    C. Lack of computing power

    D. Unavailable patch

  • Question 877:

    A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager claimed the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them as plain text within the body of a new email message thread. Which of the following actions MOST likely supports an investigation for fraudulent submission?

    A. Establish chain of custody.

    B. Inspect the file metadata.

    C. Reference the data retention policy.

    D. Review the email event logs

  • Question 878:

    An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the BEST course of action for the analyst to take?

    A. Apply a DLP solution.

    B. Implement network segmentation

    C. Utilize email content filtering,

    D. isolate the infected attachment.

  • Question 879:

    An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?

    A. HSM

    B. CASB

    C. TPM

    D. DLP

  • Question 880:

    Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).

    A. Page files

    B. Event logs

    C. RAM

    D. Cache

    E. Stored files

    F. HDD

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.