SY0-601 Premium Bundle

SY0-601 Premium Bundle

CompTIA Security+ Exam Certification Exam

4.5 
(53535 ratings)
402 QuestionsPractice Tests
402 PDFPrint version
May 2, 2024Last update

CompTIA SY0-601 Free Practice Questions

we provide 100% Correct CompTIA SY0-601 test questions which are the best for clearing SY0-601 test, and to get certified by CompTIA CompTIA Security+ Exam. The SY0-601 Questions & Answers covers all the knowledge points of the real SY0-601 exam. Crack your CompTIA SY0-601 Exam with latest dumps, guaranteed!

Free SY0-601 Demo Online For CompTIA Certifitcation:

NEW QUESTION 1
Which of the following ISO standards is certified for privacy?

  • A. ISO 9001
  • B. ISO 27002
  • C. ISO 27701
  • D. ISO 31000

Answer: C

NEW QUESTION 2
A security analyst is investigating a vulnerability in which a default file permission was set incorrectly. The company uses non-credentialed scanning for vulnerability management.
Which of the following tools can the analyst use to verify the permissions?

  • A. ssh
  • B. chmod
  • C. 1s
  • D. setuid
  • E. nessus
  • F. nc

Answer: B

NEW QUESTION 3
A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner. Which of the following access control schemes BEST fits the requirements?

  • A. Role-based access control
  • B. Discretionary access control
  • C. Mandatory access control
  • D. Attribute-based access control

Answer: B

NEW QUESTION 4
A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following BEST indicates that valid credentials were used?

  • A. The scan results show open ports, protocols, and services exposed on the target host
  • B. The scan enumerated software versions of installed programs
  • C. The scan produced a list of vulnerabilities on the target host
  • D. The scan identified expired SSL certificates

Answer: B

NEW QUESTION 5
An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include:
Check-in/checkout of credentials
The ability to use but not know the password
Automated password changes
Logging of access to credentials
Which of the following solutions would meet the requirements?

  • A. OAuth 2.0
  • B. Secure Enclave
  • C. A privileged access management system
  • D. An OpenID Connect authentication system

Answer: D

NEW QUESTION 6
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)

  • A. COPE
  • B. VDI
  • C. GPS
  • D. TOTP
  • E. RFID
  • F. BYOD

Answer: BE

NEW QUESTION 7
An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?

  • A. The system was configured with weak default security settings.
  • B. The device uses weak encryption ciphers.
  • C. The vendor has not supplied a patch for the appliance.
  • D. The appliance requires administrative credentials for the assessment.

Answer: C

NEW QUESTION 8
A company just implemented a new telework policy that allows employees to use personal devices for official email and file sharing while working from home. Some of the requirements are:
* Employees must provide an alternate work location (i.e., a home address)
* Employees must install software on the device that will prevent the loss of proprietary data but will not restrict any other software from being installed.
Which of the following BEST describes the MDM options the company is using?

  • A. Geofencing, content management, remote wipe, containerization, and storage segmentation
  • B. Content management, remote wipe, geolocation, context-aware authentication, and containerization
  • C. Application management, remote wipe, geofencing, context-aware authentication, and containerization
  • D. Remote wipe, geolocation, screen locks, storage segmentation, and full-device encryption

Answer: D

NEW QUESTION 9
A retail company that is launching a new website to showcase the company's product line and other information for online shoppers registered the following URLs:
SY0-601 dumps exhibit
Which of the following should the company use to secure its website rf the company is concerned with convenience and cost?

  • A. A self-signed certificate
  • B. A root certificate
  • C. A code-signing certificate
  • D. A wildcard certificate
  • E. An extended validation certificate

Answer: B

NEW QUESTION 10
A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log:
Which of the following can the security analyst conclude?

  • A. A replay attack is being conducted against the application.
  • B. An injection attack is being conducted against a user authentication system.
  • C. A service account password may have been changed, resulting in continuous failed logins within the application.
  • D. A credentialed vulnerability scanner attack is testing several CVEs against the application.

Answer: C

NEW QUESTION 11
A external forensics investigator has been hired to investigate a data breach at a large enterprise with numerous assets. It is known that the breach started in the DMZ and moved to the sensitive information, generating multiple logs as the attacker traversed through the network. Which of the following will BEST assist with this investigation?

  • A. Perform a vulnerability scan to identity the weak spots.
  • B. Use a packet analyzer to Investigate the NetFlow traffic.
  • C. Check the SIEM to review the correlated logs.
  • D. Require access to the routers to view current sessions.

Answer: C

NEW QUESTION 12
A customer called a company's security team to report that all invoices the customer has received over the last five days from the company appear to have fraudulent banking details. An investigation
into the matter reveals the following
* The manager of the accounts payable department is using the same password across multiple external websites and the corporate account.
* One of the websites the manager used recently experienced a data breach.
* The manager's corporate email account was successfully accessed in the last five days by an IP address located in a foreign country
Which of the following attacks has MOST likely been used to compromise the manager's corporate account?

  • A. Remote access Trojan
  • B. Brute-force
  • C. Dictionary
  • D. Credential stuffing
  • E. Password spraying

Answer: D

NEW QUESTION 13
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?

  • A. Nmapn
  • B. Heat maps
  • C. Network diagrams
  • D. Wireshark

Answer: C

NEW QUESTION 14
A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would BEST detect the presence of a rootkit in the future?

  • A. FDE
  • B. NIDS
  • C. EDR
  • D. DLP

Answer: C

NEW QUESTION 15
A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?

  • A. PCI DSS
  • B. ISO 22301
  • C. ISO 27001
  • D. NIST CSF

Answer: A

NEW QUESTION 16
A cybersecurity analyst reviews the log files from a web server and sees a series of files that indicates a directory-traversal attack has occurred. Which of the following is the analyst MOST likely seeing?
SY0-601 dumps exhibit

  • A. Option A
  • B. Option B
  • C. Option C
  • D. Option D

Answer: B

NEW QUESTION 17
Which of the following control sets should a well-written BCP include? (Select THREE)

  • A. Preventive
  • B. Detective
  • C. Deterrent
  • D. Corrective
  • E. Compensating
  • F. Physical
  • G. Recovery

Answer: ADG

NEW QUESTION 18
......

Recommend!! Get the Full SY0-601 dumps in VCE and PDF From DumpSolutions.com, Welcome to Download: https://www.dumpsolutions.com/SY0-601-dumps/ (New 402 Q&As Version)


START SY0-601 EXAM