CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A financial institution would like to store its customer data in a cloud but still allow the data to be accessed and manipulated while encrypted. Doing so would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concerned about computational overheads and slow speeds.
Which of the following cryptographic techniques would BEST meet the requirement?
- A . Asymmetric
- B . Symmetric
- C . Homomorphic
- D . Ephemeral
A company reduced the area utilized in its datacenter by creating virtual networking through automation and by creating provisioning routes and rules through scripting.
Which of the following does this example describe?
- A . laC
- B . MSSP
- C . Containers
- D . SaaS
A global company is experiencing unauthorized logging due to credential theft and account lockouts caused by brute-force attacks. The company is considering implementing a third-party identity provider to help mitigate these attacks.
Which of the following would be the BEST control for the company to require from prospective vendors?
- A . IP restrictions
- B . Multifactor authentication
- C . A banned password list
- D . A complex password policy
An organization wants to integrate its incident response processes into a workflow with automated decision points and actions based on predefined playbooks.
Which of the following should the organization implement?
- A . SIEM
- B . SOAR
- C . EDR
- D . CASB
A bad actor tries to persuade someone to provide financial information over the phone in order to gain access to funds.
Which of the following types of attacks does this scenario describe?
- A . Vishing
- B . Phishing
- C . Spear phishing
- D . Whaling
Which of the following must be in place before implementing a BCP?
- A . SLA
- B . AUP
- C . NDA
- D . BIA
A developer is building a new portal to deliver single-pane-of-glass management capabilities to customers with multiple firewalls. To Improve the user experience, the developer wants to implement an authentication and authorization standard that uses security tokens that contain assertions to pass user Information between nodes.
Which of the following roles should the developer configure to meet these requirements? (Select TWO).
- A . Identity processor
- B . Service requestor
- C . Identity provider
- D . Service provider
- E . Tokenized resource
- F . Notarized referral
An organization wants seamless authentication to its applications.
Which of the following should the organization employ to meet this requirement?
- A . SOAP
- B . SAML
- C . SSO
- D . Kerberos
A security analyst is running a vulnerability scan to check for missing patches during a suspected security rodent During which of the following phases of the response process is this activity MOST likely occurring?
- A . Containment
- B . Identification
- C . Recovery
- D . Preparation
A security engineer needs to build @ solution to satisfy regulatory requirements that stale certain critical servers must be accessed using MFA However, the critical servers are older and
are unable to support the addition of MFA.
Which of the following will the engineer MOST likely use to achieve this objective?
- A . A forward proxy
- B . A stateful firewall
- C . A jump server
- D . A port tap