CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
Developers are writing code and merging it into shared repositories several times a day, where it is tested automatically.
Which of the following concepts does this BEST represent?
- A . Functional testing
- B . Stored procedures
- C . Elasticity
- D . Continuous integration
A company uses a drone for precise perimeter and boundary monitoring.
Which of the following should be MOST concerning to the company?
- A . Privacy
- B . Cloud storage of telemetry data
- C . GPS spoofing
- D . Weather events
The security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted files. The analyst has been tasked with determining the infringing source machine and instructed to implement measures to prevent such incidents from occurring again.
Which of the following is MOST capable of accomplishing both tasks?
- A . HIDS
- B . Allow list
- C . TPM
- D . NGFW
A user reports trouble using a corporate laptop. The laptop freezes and responds slowly when writing documents and the mouse pointer occasional disappears.
The task list shows the following results
Which of the following is MOST likely the issue?
- A . RAT
- B . PUP
- C . Spyware
- D . Keylogger
Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).
- A . Mantraps
- B . Security guards
- C . Video surveillance
- D . Fences
- E . Bollards
- F . Antivirus
A security assessment found that several embedded systems are running unsecure protocols. These Systems were purchased two years ago and the company that developed them is no longer in business.
Which of the following constraints BEST describes the reason the findings cannot be remediated?
- A . inability to authenticate
- B . Implied trust
- C . Lack of computing power
- D . Unavailable patch
Which of the following uses six initial steps that provide basic control over system security by including hardware and software inventory, vulnerability management, and continuous monitoring to minimize risk in all network environments?
- A . ISO 27701
- B . The Center for Internet Security
- C . SSAE SOC 2
- D . NIST Risk Management Framework
The Chief Executive Officer announced a new partnership with a strategic vendor and asked the Chief Information Security Officer to federate user digital identities using SAML-based protocols.
Which of the following will this enable?
- A . SSO
- B . MFA
- C . PKI
- D . OLP
A company was compromised, and a security analyst discovered the attacker was able to get access to a service account. The following logs were discovered during the investigation:
Which of the following MOST likely would have prevented the attacker from learning the service account name?
- A . Race condition testing
- B . Proper error handling
- C . Forward web server logs to a SIEM
- D . Input sanitization
The SIEM at an organization has detected suspicious traffic coming a workstation in its internal
network. An analyst in the SOC the workstation and discovers malware that is associated with a botnet is installed on the device A review of the logs on the workstation reveals that the privileges of the local account were escalated to a local administrator.
To which of the following groups should the analyst report this real-world event?
- A . The NOC team
- B . The vulnerability management team
- C . The CIRT
- D . The read team