Exam Details

  • Exam Code
    :SY0-601
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1334 Q&As
  • Last Updated
    :Mar 29, 2025

CompTIA CompTIA Certifications SY0-601 Questions & Answers

  • Question 71:

    A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?

    A. Scan the NAS for residual or dormant malware and take new daily backups that are tested on a frequent basis.

    B. Restrict administrative privileges and patch all systems and applications.

    C. Rebuild all workstations and install new antivirus software.

    D. Implement application whitelisting and perform user application hardening.

  • Question 72:

    A company is expanding its threat surface program and allowing individuals to security test the company's internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

    A. Open-source intelligence

    B. Bug bounty

    C. Red team

    D. Penetration testing

  • Question 73:

    An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Choose two.)

    A. Application

    B. Authentication

    C. Error

    D. Network

    E. Firewall

    F. System

  • Question 74:

    An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

    A. Compromise

    B. Retention

    C. Analysis

    D. Transfer

    E. Inventory

  • Question 75:

    An organization would like to store customer data on a separate part of the network that is not accessible to users on the mam corporate network. Which of the following should the administrator use to accomplish this goal?

    A. Segmentation

    B. Isolation

    C. Patching

    D. Encryption

  • Question 76:

    Which of the following are the MOST likely vectors for the unauthorized or unintentional inclusion of vulnerable code in a software company's final software releases? (Choose two.)

    A. Unsecure protocols

    B. Use of penetration-testing utilities

    C. Weak passwords

    D. Included third-party libraries

    E. Vendors/supply chain

    F. Outdated anti-malware software

  • Question 77:

    An attacker tricks a user into providing confidential information. Which of the following describes this form of malicious reconnaissance?

    A. Phishing

    B. Social engineering

    C. Typosquatting

    D. Smishing

  • Question 78:

    A company is adding a clause to its AUP that states employees are not allowed to modify the operating system on mobile devices. Which of the following vulnerabilities is the organization addressing?

    A. Cross-site scripting

    B. Buffer overflow

    C. Jailbreaking

    D. Side loading

  • Question 79:

    A large bank with two geographically dispersed data centers is concerned about major power disruptions at both locations. Every day each location experiences very brief outages that last for a few seconds. However, during the summer a high risk of intentional under-voltage events that could last up to an hour exists, particularly at one of the locations near an industrial smelter. Which of the following is the best solution to reduce the risk of data loss?

    A. Dual supply

    B. Generator

    C. PDU

    D. Daily backups

  • Question 80:

    Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

    A. Compensating control

    B. Network segmentation

    C. Transfer of risk

    D. SNMP traps

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-601 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.