CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
During a Chief Information Security Officer (CISO) convention to discuss security awareness, the attendees are provided with a network connection to use as a resource. As the convention progresses, one of the attendees starts to notice delays in the connection, and the HIIPS site requests are reverting to HTTP.
Which of the following BEST describes what is happening?
- A . Birthday collision on the certificate key
- B . DNS hijacking to reroute traffic
- C . Brute force to the access point
- D . ASSLILS downgrade
An organization would like to remediate the risk associated with its cloud service provider not meeting its advertised 99.999% availability metrics.
Which of the following should the organization consult for the exact requirements for the cloud provider?
- A . SLA
- B . BPA
- C . NDA
- D . MOU
An enterprise has hired an outside security firm to facilitate penetration testing on its network and applications. The firm has agreed to pay for each vulnerability that ts discovered.
Which of the following BEST represents the type of testing that is being used?
- A . White-box
- B . Red-leam
- C . Bug bounty
- D . Gray-box
- E . Black-box
A retail company that is launching @ new website to showcase the company’s product line and other information for online shoppers registered the following URLs:
* www companysite com
* shop companysite com
* about-us companysite com contact-us. companysite com secure-logon company site com
Which of the following should the company use to secure its website if the company is concerned with convenience and cost?
- A . A self-signed certificate
- B . A root certificate
- C . A code-signing certificate
- D . A wildcard certificate
- E . An extended validation certificate
Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?
- A . Tabletop
- B . Parallel
- C . Full interruption
- D . Simulation
A systems administrator is considering different backup solutions for the IT infrastructure. The company is looking for a solution that offers the fastest recovery time while also saving the most amount of storage used to maintain the backups.
Which of the following recovery solutions would be the BEST option to meet these requirements?
- A . Snapshot
- B . Differential
- C . Full
- D . Tape
After a phishing scam fora user’s credentials, the red team was able to craft payload to deploy on a server. The attack allowed the installation of malicious software that initiates a new remote session.
Which of the following types of attacks has occurred?
- A . Privilege escalation
- B . Session replay
- C . Application programming interface
- D . Directory traversal
A cybersecurity administrator needs to implement a Layer 7 security control on a network and block potential attacks.
Which of the following can block an attack at Layer 7? (Select TWO).
- A . HIDS
- B . NIPS
- C . HSM
- D . WAF
- E . NAC
- F . NIDS
- G . Stateless firewall
During an incident, a company’s CIRT determines it is necessary to observe the continued network-based transactions between a callback domain and the malware running on an enterprise PC.
Which of the following techniques would be BEST to enable this activity while reducing the nsk of lateral spread and the risk that the adversary would notice any changes?
- A . Physically move the PC to a separate Internet point of presence.
- B . Create and apply microsegmentation rules,
- C . Emulate the malware in a heavily monitored DMZ segment
- D . Apply network blacklisting rules for the adversary domain
A business is looking for a cloud service provider that offers a la carte services, including cloud backups, VM elasticity, and secure networking.
Which of the following cloud service provider types should business engage?
- A . A laaS
- B . PaaS
- C . XaaS
- D . SaaS