CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A security analyst is responding to an alert from the SIEM. The alert states that malware was discovered on a host and was not automatically deleted.
Which of the following would be BEST for the analyst to perform?
- A . Add a deny-all rule to that host in the network ACL
- B . Implement a network-wide scan for other instances of the malware.
- C . Quarantine the host from other parts of the network
- D . Revoke the client’s network access certificates
A cybersecurity administrator needs to allow mobile BYOD devices to access network resources.
As the devices are not enrolled to the domain and do not have policies applied to them, which of the following are best practices for authentication and infrastructure security? (Select TWO).
- A . Create a new network for the mobile devices and block the communication to the internal network and servers
- B . Use a captive portal for user authentication.
- C . Authenticate users using OAuth for more resiliency
- D . Implement SSO and allow communication to the internal network
- E . Use the existing network and allow communication to the internal network and servers.
- F . Use a new and updated RADIUS server to maintain the best solution
An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread.
Which of the following is the BEST course of action for the analyst to take?
- A . Apply a DLP solution.
- B . Implement network segmentation
- C . Utilize email content filtering,
- D . isolate the infected attachment.
An enterprise needs to keep cryptographic keys in a safe manner.
Which of the following network appliances can achieve this goal?
- A . HSM
- B . CASB
- C . TPM
- D . DLP
An organization recently acquired an ISO 27001 certification.
Which of the following would MOST likely be considered a benefit of this certification?
- A . It allows for the sharing of digital forensics data across organizations
- B . It provides insurance in case of a data breach
- C . It provides complimentary training and certification resources to IT security staff.
- D . It certifies the organization can work with foreign entities that require a security clearance
- E . It assures customers that the organization meets security standards
A company would like to provide flexibility for employees on device preference. However, the company is concerned about supporting too many different types of hardware.
Which of the following deployment models will provide the needed flexibility with the GREATEST amount of control and security over company data and infrastructure?
- A . BYOD
- B . VDI
- C . COPE
- D . CYOD
A security analyst reports a company policy violation in a case in which a large amount of sensitive data is being downloaded after hours from various mobile devices to an external site. Upon further investigation, the analyst notices that successful login attempts are being conducted with impossible travel times during the same time periods when the unauthorized downloads are occurring. The analyst also discovers a couple of WAPs are using the same SSID, but they have non-standard DHCP configurations and an overlapping channel.
Which of the following attacks is being conducted?
- A . Evil twin
- B . Jamming
- C . DNS poisoning
- D . Bluesnarfing
- E . DDoS
A security analyst must enforce policies to harden an MDM infrastructure.
The requirements are as follows:
* Ensure mobile devices can be tracked and wiped.
* Confirm mobile devices are encrypted.
Which of the following should the analyst enable on all the devices to meet these requirements?
- A . A Geofencing
- B . Biometric authentication
- C . Geolocation
- D . Geotagging
A company installed several crosscut shredders as part of increased information security practices targeting data leakage risks.
Which of the following will this practice reduce?
- A . Dumpster diving
- B . Shoulder surfing
- C . Information elicitation
- D . Credential harvesting
Which of the following conditions impacts data sovereignty?
- A . Rights management
- B . Criminal investigations
- C . Healthcare data
- D . International operations