Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Mar 21, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 21:

    In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?

    A. Risk tolerance

    B. Risk acceptance

    C. Risk importance

    D. Risk appetite

  • Question 22:

    A company is designing the layout of a new data center so it will have an optimal environmental temperature. Which of the following must be included? (Choose two.)

    A. An air gap

    B. A cold aisle

    C. Removable doors

    D. A hot aisle

    E. An IoT thermostat

    F. A humidity monitor

  • Question 23:

    A company currently uses passwords for logging in to company-owned devices and wants to add a second authentication factor. Per corporate policy, users are not allowed to have smartphones at their desks. Which of the following would meet these requirements?

    A. Smart card

    B. PIN code

    C. Knowledge-based question

    D. Secret key

  • Question 24:

    The Chief Technology Officer of a local college would like visitors to utilize the school's Wi-Fi but must be able to associate potential malicious activity to a specific person. Which of the following would best allow this objective to be met?

    A. Requiring all new. on-site visitors to configure their devices to use WPS

    B. Implementing a new SSID for every event hosted by the college that has visitors

    C. Creating a unique PSK for every visitor when they arrive at the reception area

    D. Deploying a captive portal to capture visitors' MAC addresses and names

  • Question 25:

    Which of the following threat actors is most likely to be motivated by ideology?

    A. Business competitor

    B. Hacktivist

    C. Criminal syndicate

    D. Script kiddie

    E. Disgruntled employee

  • Question 26:

    A cybersecurity incident response team at a large company receives notification that malware is present on several corporate desktops. No known indicators of compromise have been found on the network. Which of the following should the team do first to secure the environment?

    A. Contain the impacted hosts.

    B. Add the malware to the application blocklist.

    C. Segment the core database server.

    D. Implement firewall rules to block outbound beaconing.

  • Question 27:

    A security administrator manages five on-site APs. Each AP uses different channels on a 5GHz network. The administrator notices that another access point with the same corporate SSID on an overlapping channel was created. Which of the following attacks most likely occurred?

    A. Jamming

    B. NFC attacks

    C. Disassociation

    D. Bluesnarfing

    E. Evil twin

  • Question 28:

    A security team has been alerted to a flood of incoming emails that have various subject lines and are addressed to multiple email inboxes. Each email contains a URL shortener link that is redirecting to a dead domain. Which of the following is the best step for the security team to take?

    A. Create a blocklist for all subject lines.

    B. Send the dead domain to a DNS sinkhole.

    C. Quarantine all emails received and notify all employees.

    D. Block the URL shortener domain in the web proxy.

  • Question 29:

    A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

    A. SSO

    B. LEAP

    C. MFA

    D. PEAP

  • Question 30:

    Which of the following is most likely associated with introducing vulnerabilities on a corporate network by the deployment of unapproved software?

    A. Hacktivists

    B. Script kiddies

    C. Competitors

    D. Shadow IT

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.