Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Mar 29, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 61:

    Which of the following secure application development concepts aims to block verbose error messages from being shown in a user's interface?

    A. OWASP

    B. Obfuscation/camouflage

    C. Test environment

    D. Prevent of information exposure

  • Question 62:

    An email security vendor recently added a retroactive alert after discovering a phishing email had already been delivered to an inbox. Which of the following would be the best way for the security administrator to address this type of alert in the future?

    A. Utilize a SOAR playbook to remove the phishing message.

    B. Manually remove the phishing emails when alerts arrive.

    C. Delay all emails until the retroactive alerts are received.

    D. Ingest the alerts into a SIEM to correlate with delivered messages.

  • Question 63:

    A security administrator needs to block a TCP connection using the corporate firewall, Because this connection is potentially a threat. the administrator not want to back an RST.

    Which of the following actions in rule would work best?

    A. Drop

    B. Reject

    C. Log alert

    D. Permit

  • Question 64:

    Which of the following would a security analyst use to determine if other companies in the same sector have seen similar malicious activity against their systems?

    A. Vulnerability scanner

    B. Open-source intelligence

    C. Packet capture

    D. Threat feeds

  • Question 65:

    A manufacturing organization wants to control and monitor access from the internal business network to the segregated production network, while ensuring minimal exposure of the production network to devices. Which of the following solutions would best accomplish this goal?

    A. Proxy server

    B. NGFW

    C. WAF

    D. Jump server

  • Question 66:

    During an engagement, penetration testers left USB keys that contained specially crafted malware in the company's parking lot. A couple days later, the malware contacted the command-and-control server, giving the penetration testers unauthorized access to the company endpoints. Which of the following will most likely be a recommendation in the engagement report?

    A. Conduct an awareness campaign on the usage of removable media.

    B. Issue a user guidance program focused on vishing campaigns.

    C. Implement more complex password management practices.

    D. Establish a procedure on identifying and reporting suspicious messages.

  • Question 67:

    Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

    A. Disaster recovery plan

    B. Incident response procedure

    C. Business continuity plan

    D. Change management procedure

  • Question 68:

    The Chief Security Officer (CSO) at a major hospital wants to implement SSO to help improve security in the environment and protect patient data, particularly at shared terminals. The Chief Risk Officer (CRO) is concerned that training and guidance have not been provided to frontline staff, and a risk analysis has not been performed. Which of the following is the MOST likely cause of the CRO's concerns?

    A. SSO would simplify username and password management, making it easier for hackers to guess accounts.

    B. SSO would reduce password fatigue, but staff would still need to remember more complex passwords.

    C. SSO would reduce the password complexity for frontline staff.

    D. SSO would reduce the resilience and availability of systems if the identity provider goes offline.

  • Question 69:

    Which of the following security concepts should an e-commerce organization apply for protection against erroneous purchases?

    A. Privacy

    B. Availability

    C. Integrity

    D. Confidentiality

  • Question 70:

    Which of the following threat vectors would appear to be the most legitimate when used by a malicious actor to impersonate a company?

    A. Phone call

    B. Instant message

    C. Email

    D. Text message

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.