CompTIA SY0-601 CompTIA Security+ Exam Online Training
CompTIA SY0-601 Online Training
The questions for SY0-601 were last updated at Jan 28,2025.
- Exam Code: SY0-601
- Exam Name: CompTIA Security+ Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
Which of the following environments would MOST likely be used to assess the execution of component parts of a system at both the hardware and software levels and to measure performance characteristics?
- A . Test
- B . Staging
- C . Development
- D . Production
A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters.
Which of the following is the primary use case for this scenario?
- A . Implementation of preventive controls
- B . Implementation of detective controls
- C . Implementation of deterrent controls
- D . Implementation of corrective controls
Which of the following in a forensic investigation should be priorities based on the order of volatility? (Select TWO).
- A . Page files
- B . Event logs
- C . RAM
- D . Cache
- E . Stored files
- F . HDD
The Chief Technology Officer of a local college would like visitors to utilize the school’s WiFi but must be able to associate potential malicious activity to a specific person.
Which of the following would BEST allow this objective to be met?
- A . Requiring all new, on-site visitors to configure their devices to use WPS
- B . Implementing a new SSID for every event hosted by the college that has visitors
- C . Creating a unique PSK for every visitor when they arrive at the reception area
- D . Deploying a captive portal to capture visitors’ MAC addresses and names
An analyst Is generating a security report for the management team. Security guidelines recommend disabling all listening unencrypted services.
Given this output from Nmap:
Which of the following should the analyst recommend to disable?
- A . 21/tcp
- B . 22/tcp
- C . 23/tcp
- D . 443/tcp
As part of a company’s ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners.
Which of the following will the company MOST likely implement?
- A . TAXII
- B . TLP
- C . TTP
- D . STIX
A security incident has been resolved.
Which of the following BEST describes the importance of the final phase of the incident response plan?
- A . It examines and documents how well the team responded discovers what caused the incident, and determines how the incident can be avoided in the future
- B . It returns the affected systems back into production once systems have been fully patched, data restored and vulnerabilities addressed
- C . It identifies the incident and the scope of the breach how it affects the production environment, and the ingress point
- D . It contains the affected systems and disconnects them from the network, preventing further spread of the attack or breach
Which of the following describes a maintenance metric that measures the average time required to troubleshoot and restore failed equipment?
- A . RTO
- B . MTBF
- C . MTTR
- D . RPO
Which of the following should a technician consider when selecting an encryption method for data that needs to remain confidential for a specific length of time?
- A . The key length of the encryption algorithm
- B . The encryption algorithm’s longevity
- C . A method of introducing entropy into key calculations
- D . The computational overhead of calculating the encryption key
A network analyst is investigating compromised corporate information. The analyst leads to a theory that network traffic was intercepted before being transmitted to the internet.
The following output was captured on an internal host:
Based on the IoCS, which of the following was the MOST likely attack used to compromise the network communication?
- A . Denial of service
- B . ARP poisoning
- C . Command injection
- D . MAC flooding