CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
If a current private key is compromised, which of the following would ensure it cannot be used to decrypt ail historical data?
- A . Perfect forward secrecy
- B . Elliptic-curve cryptography
- C . Key stretching
- D . Homomorphic encryption
Which of the following environments can be stood up in a short period of time, utilizes either dummy data or actual data, and is used to demonstrate and model system capabilities and functionality for a fixed, agreed-upon duration of time?
- A . PoC
- B . Production
- C . Test
- D . Development
After segmenting the network, the network manager wants to control the traffic between the segments.
Which of the following should the manager use to control the network traffic?
- A . A DMZ
- B . A VPN a
- C . A VLAN
- D . An ACL
A security researcher is tracking an adversary by noting its attacks and techniques based on its capabilities, infrastructure, and victims.
Which of the following is the researcher MOST likely using?
- A . The Diamond Model of Intrusion Analysis
- B . The Cyber Kill Chain
- C . The MITRE CVE database
- D . The incident response process
A security engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks.
Which of the following should the engineer implement?
- A . An air gap
- B . A hot site
- C . A VUAN
- D . A screened subnet
one of the attendees starts to notice delays in the connection. and the HTTPS site requests are reverting to HTTP.
Which of the following BEST describes what is happening?
- A . Birthday collision on the certificate key
- B . DNS hacking to reroute traffic
- C . Brute force to the access point
- D . A SSL/TLS downgrade
A major clothing company recently lost a large amount of proprietary information. The security officer must find a solution to ensure this never happens again.
Which of the following is the BEST technical implementation to prevent this from happening again?
- A . Configure DLP solutions
- B . Disable peer-to-peer sharing
- C . Enable role-based
- D . Mandate job rotation
- E . Implement content filters
The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls.
This is an example of:
- A . prepending.
- B . an influence campaign.
- C . a watering-hole attack.
- D . intimidation.
- E . information elicitation.
A company is required to continue using legacy software to support a critical service.
Which of the following BEST explains a risk of this practice?
- A . Default system configuration
- B . Unsecure protocols
- C . Lack of vendor support
- D . Weak encryption
A security researcher has alerted an organization that its sensitive user data was found for sale on a website.
Which of the following should the organization use to inform the affected parties?
- A . A An incident response plan
- B . A communications plan
- C . A business continuity plan
- D . A disaster recovery plan