CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A network analyst is setting up a wireless access point for a home office in a remote, rural location. The requirement is that users need to connect to the access point securely but do not want to have to remember passwords.
Which of the following should the network analyst enable to meet the requirement?
- A . MAC address filtering
- B . 802.1X
- C . Captive portal
- D . WPS
Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?
- A . Production
- B . Test
- C . Staging
- D . Development
While reviewing pcap data, a network security analyst is able to locate plaintext usernames and passwords being sent from workstations to network witches.
Which of the following is the security analyst MOST likely observing?
- A . SNMP traps
- B . A Telnet session
- C . An SSH connection
- D . SFTP traffic
A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager claimed the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them as plain text within the body of a new email message thread.
Which of the following actions MOST likely supports an investigation for fraudulent submission?
- A . Establish chain of custody.
- B . Inspect the file metadata.
- C . Reference the data retention policy.
- D . Review the email event logs
A new vulnerability in the SMB protocol on the Windows systems was recently discovered, but no patches are currently available to resolve the issue. The security administrator is concerned tf servers in the company’s DMZ will be vulnerable to external attack; however, the administrator cannot disable the service on the servers, as SMB is used by a number of internal systems and applications on the LAN.
Which of the following TCP ports should be blocked for all external inbound connections to the DMZ as a workaround to protect the servers? (Select TWO).
- A . 135
- B . 139
- C . 143
- D . 161
- E . 443
- F . 445
When planning to build a virtual environment, an administrator need to achieve the following,
• Establish polices in Limit who can create new VMs
• Allocate resources according to actual utilization‘
• Require justification for requests outside of the standard requirements.
• Create standardized categories based on size and resource requirements.
Which of the following is the administrator MOST likely trying to do?
- A . Implement IaaS replication
- B . Product against VM escape
- C . Deploy a PaaS
- D . Avoid VM sprawl
A security analyst wants to verify that a client-server (non-web) application is sending encrypted traffic.
Which of the following should the analyst use?
- A . openssl
- B . hping
- C . netcat
- D . tcpdump
Ann, a customer, received a notification from her mortgage company stating her PII may be shared with partners, affiliates, and associates to maintain day-to-day business operations.
Which of the following documents did Ann receive?
- A . An annual privacy notice
- B . A non-disclosure agreement
- C . A privileged-user agreement
- D . A memorandum of understanding
A large enterprise has moved all its data to the cloud behind strong authentication and encryption. A sales director recently had a laptop stolen, and later, enterprise data was found to have been compromised from a local database.
Which of the following was the MOST likely cause?
- A . Shadow IT
- B . Credential stuffing
- C . SQL injection
- D . Man in the browser
- E . Bluejacking
The following are the logs of a successful attack.
Which of the following controls would be BEST to use to prevent such a breach in the future?
- A . Password history
- B . Account expiration
- C . Password complexity
- D . Account lockout