Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Apr 14, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 1191:

    Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public Which of the following security solutions would mitigate the risk of future data disclosures?

    A. FDE

    B. TPM

    C. HIDS D. VPN

  • Question 1192:

    During an incident, a company's CIRT determines it is necessary to observe the continued network-based transactions between a callback domain and the malware running on an enterprise PC.

    Which of the following techniques would be BEST to enable this activity while reducing the nsk of lateral spread and the nsk that the adversary would notice any changes?

    A. Physically move the PC to a separate Internet point of presence.

    B. Create and apply microsegmentation rules,

    C. Emulate the malware in a heavily monitored DMZ segment

    D. Apply network blacklisting rules for the adversary domain

  • Question 1193:

    Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).

    A. Mantraps

    B. Security guards

    C. Video surveillance

    D. Fences

    E. Bollards

    F. Antivirus

  • Question 1194:

    A network analyst is setting up a wireless access point for a home office in a remote, rural location. The requirement is that users need to connect to the access point securely but do not want to have to remember passwords

    Which of the following should the network analyst enable to meet the requirement?

    A. MAC address filtering

    B. 802.1X

    C. Captive portal

    D. WPS

  • Question 1195:

    A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic. Which of the following should the analyst use?

    A. openssl

    B. hping

    C. netcat

    D. tcpdump

  • Question 1196:

    An organization wants to integrate its incident response processes into a workflow with automated decision points and actions based on predefined playbooks. Which of the following should the organization implement?

    A. SIEM

    B. SOAR

    C. EDR

    D. CASB

  • Question 1197:

    Which of the following would MOST likely be identified by a credentialed scan but would be missed by an uncredentialed scan?

    A. Vulnerabilities with a CVSS score greater than 6.9.

    B. Critical infrastructure vulnerabilities on non-IP protocols.

    C. CVEs related to non-Microsoft systems such as printers and switches.

    D. Missing patches for third-party software on Windows workstations and servers.

  • Question 1198:

    When planning to build a virtual environment, an administrator needs to achieve the following:

    1.

    Establish policies to limit who can create new VMs.

    2.

    Allocate resources according to actual utilization.

    3.

    Require justification for requests outside of the standard requirements.

    4.

    Create standardized categories based on size and resource requirements.

    Which of the following is the administrator MOST likely trying to do?

    A. Implement IaaS replication

    B. Product against VM escape

    C. Deploy a PaaS

    D. Avoid VM sprawl

  • Question 1199:

    A major clothing company recently lost a large amount of proprietary information.

    The security officer must find a solution to ensure this never happens again .

    Which of the following is the BEST technical implementation to prevent this from happening again?

    A. Configure DLP solutions

    B. Disable peer-to-peer sharing

    C. Enable role-based access controls.

    D. Mandate job rotation.

    E. Implement content filters

  • Question 1200:

    The Chief Information Security Officer directed a risk reduction in shadow IT and created a policy requiring all unsanctioned high-risk SaaS applications to be blocked from user access

    Which of the following is the BEST security solution to reduce this risk?

    A. CASB

    B. VPN concentrator

    C. MFA

    D. VPC endpoint

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.