Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Mar 29, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 141:

    Which Of the following control types is patch management classified under?

    A. Deterrent

    B. Physical

    C. Corrective

    D. Detective

  • Question 142:

    A company a "right to forgotten" request To legally comply, the company must remove data related to the requester from its systems. Which Of the following Company most likely complying with?

    A. NIST CSF

    B. GDPR

    C. PCI OSS

    D. ISO 27001

  • Question 143:

    Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?

    A. DLP

    B. TLS

    C. AV

    D. IDS

  • Question 144:

    A data cento has experienced an increase in under-voltage events Mowing electrical grid maintenance outside the facility These events are leading to occasional losses of system availability.

    Which of the following would be the most cost-effective solution for the data center 10 implement?

    A. Uninterruptible power supplies with battery backup

    B. Managed power distribution units lo track these events

    C. A generator to ensure consistent, normalized power delivery

    D. Dual power supplies to distribute the load more evenly

  • Question 145:

    A security administrator is integrating several segments onto a single network. One of the segments, which includes legacy devices, presents a significant amount of risk to the network.

    Which of the following would allow users to access to the legacy devices without compromising the security of the entire network?

    A. NIDS

    B. MAC filtering

    C. Jump server

    D. IPSec

    E. NAT gateway

  • Question 146:

    A company would like to move to the cloud. The company wants to prioritize control and security over cost and ease of management. Which of the following cloud models would best suit this company's priorities?

    A. Public

    B. Hybrid

    C. Community

    D. Private

  • Question 147:

    Which of the following is a security implication of newer 1CS devices that are becoming more common in corporations?

    A. Devices with celular communication capabilities bypass traditional network security controls

    B. Many devices do not support elliptic-curve encryption algorithms due to the overhead they require.

    C. These devices often lade privacy controls and do not meet newer compliance regulations

    D. Unauthorized voice and audio recording can cause loss of intellectual property

  • Question 148:

    A small, local company experienced a ransomware attack. The company has one web- facing server and a few workstations. Everything is behind an ISP firewall. A single web- facing server is set up on the router to forward all ports so that the server is viewable from the internet. The company uses an older version of third-party software to manage the website. The assets were never patched. Which of the following should be done to prevent an attack like this from happening again? (Select three).

    A. Install DLP software to prevent data loss.

    B. Use the latest version of software.

    C. Install a SIEM device.

    D. Implement MDM.

    E. Implement a screened subnet for the web server.

    F. Install an endpoint security solution.

    G. Update the website certificate and revoke the existing ones.

    H. Deploy additional network sensors.

  • Question 149:

    A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the best way to secure a replacement computer and deter future theft?

    A. Installing proximity card readers on all entryway doors

    B. Deploying motion sensor cameras in the lobby

    C. Encrypting the hard drive on the new desktop

    D. Using cable locks on the hardware

  • Question 150:

    A security investigation revealed mat malicious software was installed on a server using a server administrator credentials. During the investigation the server administrator explained that Telnet was regularly used to log in. Which of the blowing most likely occurred?

    A. A spraying attack was used to determine which credentials to use

    B. A packet capture tool was used to steal the password

    C. A remote-access Trojan was used to install the malware

    D. A directory attack was used to log in as the server administrator

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.