CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A company wants to modify its current backup strategy to modify its current backup strategy to minimize the number of backups that would need to be restored in case of data loss.
Which of the following would be the BEST backup strategy
- A . Incremental backups followed by differential backups
- B . Full backups followed by incremental backups
- C . Delta backups followed by differential backups
- D . Incremental backups followed by delta backups
- E . Full backup followed by different backups
Which of the following is the MOST secure but LEAST expensive data destruction method for data that is stored on hard drives?
- A . Pulverizing
- B . Shredding
- C . Incinerating
- D . Degaussing
A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m – 4:00 am. The malware has evaded detection by traditional antivirus software.
Which of the following types of malware is MOST likely infecting the hosts?
- A . A RAT
- B . Ransomware
- C . Polymophic
- D . A worm
Which of the following would be BEST for a technician to review to determine the total risk an organization can bear when assessing a "cloud-first" adoption strategy?
- A . Risk matrix
- B . Risk tolerance
- C . Risk register
- D . Risk appetite
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)
- A . Block cipher
- B . Hashing
- C . Private key
- D . Perfect forward secrecy
- E . Salting
- F . Symmetric keys
A security analyst notices several attacks are being blocked by the NIPS but does not see anything on the boundary firewall logs. The attack seems to have been thwarted.
Which of the following resiliency techniques was applied to the network to prevent this attack?
- A . NIC Teaming
- B . Port mirroring
- C . Defense in depth
- D . High availability
- E . Geographic dispersal
Which of the following isa risk that is specifically associated with hesting applications iin the public cloud?
- A . Unsecured root accounts
- B . Zero day
- C . Shared tenancy
- D . Insider threat
A company is required to continue using legacy software to support a critical service.
Which of the following BEST explains a risk of this practice?
- A . Default system configuration
- B . Unsecure protocols
- C . Lack of vendor support
- D . Weak encryption
After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time.
Which of the following BEST explains what happened?
- A . The unexpected traffic correlated against multiple rules, generating multiple alerts.
- B . Multiple alerts were generated due to an attack occurring at the same time.
- C . An error in the correlation rules triggered multiple alerts.
- D . The SIEM was unable to correlate the rules, triggering the alerts.
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise.
Which of the following control types does this BEST represent?
- A . Preventive
- B . Compensating
- C . Corrective
- D . Detective