Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SY0-601 Exam Dumps - CompTIA Security+ Questions and Answers

Question # 184

An organization wants to limit potential impact to its log-in database in the event of a breach. Which of the following options is the security team most likely to recommend?

Options:

A.

Tokenization

B.

Hashing

C.

Obfuscation

D.

Segmentation

Buy Now
Question # 185

A company is providing security awareness training regarding the importance of not forwarding social media messages from unverified sources. Which of the following risks would this training help to prevent?

Options:

A.

Hoaxes

B.

SPIMs

C.

Identity fraud

D.

Credential harvesting

Buy Now
Question # 186

Which of the following is a common source of unintentional corporate credential leakage in cloud environments?

Options:

A.

Code repositories

B.

Dark web

C.

Threat feeds

D.

State actors

E.

Vulnerability databases

Buy Now
Question # 187

An administrator identifies some locations on the third floor of the building that have a poor wireless signal. Multiple users confirm the incident and report it is not an isolated event. Which of the following should the administrator use to find the areas with a poor or nonexistent wireless signal?

Options:

A.

Heat map

B.

Agentless scanning

C.

Wardriving

D.

Embedded systems

Buy Now
Question # 188

An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?

Options:

A.

SSH

B.

SRTP

C.

S/MIME

D.

PPTP

Buy Now
Question # 189

Which of the following best represents an application that does not have an on-premises requirement and is accessible from anywhere?

Options:

A.

PaaS

B.

Hybrid cloud

C.

Private cloud

D.

laaS

E.

SaaS

Buy Now
Question # 190

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

Options:

A.

Penetration test

B.

Continuity of operations planning

C.

Tabletop exercise

D.

Simulation

Buy Now
Question # 191

A company would like to implement a daily backup solution. The backup will be stored on a NAS appliance, and capacity is not a limiting factor. Which of the following will the company most likely implement to ensure complete restoration?

Options:

A.

Full

B.

Incremental

C.

Snapshot

D.

Differential

Buy Now
Question # 192

A company uses a SaaS vendor to host its customer database. The company would like to reduce the risk of customer data exposure if the systems are breached. Which of the following risks should the company focus on to achieve this objective?

Options:

A.

Weak encryption

B.

Outsourced code development

C.

Supply chain

D.

Open ports and services

Buy Now
Question # 193

Which of the following should a security operations center use to improve. Which of the following access controls is most likely inhibiting the transfer?

Options:

A.

Attribute-based

B.

Time of day

C.

Role-based

D.

Least privilege

Buy Now
Question # 194

The Chief Information Security Officer of an organization needs to ensure recovery from ransomware would likely occur within the organization's agreed-upon RPOs and RTOs. Which of the following backup scenarios would best ensure recovery?

Options:

A.

Hourly differential backups stored on a local SAN array

B.

Daily full backups stored on premises in magnetic offline media

C.

Daily differential backups maintained by a third-party cloud provider

D.

Weekly full backups with daily incremental stored on a NAS drive

Buy Now
Question # 195

The Chief Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells the analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?

Options:

A.

Log in to the server and perform a health check on the VM.

B.

Install the patch immediately.

C.

Confirm that the backup service is running.

D.

Take a snapshot of the VM.

Buy Now
Question # 196

A new company wants to avoid channel interference when building a WLAN. The company needs to know the radio frequency behavior, identify dead zones, and determine the best place for access points. Which of the following should be done first?

Options:

A.

Configure heat maps.

B.

Utilize captive portals.

C.

Conduct a site survey.

D.

Install Wi-Fi analyzers.

Buy Now
Question # 197

A security analyst is preparing a report that details the circumstances that led to a security incident and steps that can be taken in the future to prevent recurrence. Which of the following best describes this phase of the incident response process?

Options:

A.

Lessons learned

B.

Identification

C.

Recovery

D.

Containment

Buy Now
Question # 198

A security analyst is reviewing a secure website that is generating TLS certificate errors The analyst determines that the browser is unable to receive a response from the OCSP for the certificate. Which of the following actions would most likely resolve the issue?

Options:

A.

Run a traceroute on the OCSP domain to find where the domain is failing

B.

Create an exclusion for the OCSP domain in the content filter

C.

Unblock the OCSP protocol in the host-based firewall

D.

Add the root certificate to the trusted sites on the workstation with the issue

Buy Now
Question # 199

After conducting a vulnerability scan a systems administrator notices that one of the identified vulnerabilities is not present on the systems that were scanned. Which of the following describes this example?

Options:

A.

False positive

B False negative

B.

True positive

C.

True negative

Buy Now
Question # 200

An organization would like to gain actionable intelligence about real attacker techniques used against its systems. Which of the following should the organization use to best achieve this objective?

Options:

A.

Antivirus

B.

Honeypot

C.

Firewall

D.

Sensor

Buy Now
Question # 201

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device. Which of the following best describes the user’s activity?

Options:

A.

Penetration testing

B.

Phishing campaign

C.

External audit

D.

Insider threat

Buy Now
Question # 202

Which of the following describes how applications are built, configured, and deployed?

Options:

A.

Provisioning

B.

Continuous validation

C.

Compiler

D.

Normalization

Buy Now
Question # 203

A company wants to implement MFA. Which of the following enables the additional factor while using a smart card?

Options:

A.

PIN

B.

Hardware token

C.

User ID

D.

SMS

Buy Now
Exam Code: SY0-601
Exam Name: CompTIA Security+ Exam 2023
Last Update: Feb 22, 2025
Questions: 1063
SY0-601 pdf

SY0-601 PDF

$25.5  $84.99
SY0-601 Engine

SY0-601 Testing Engine

$28.5  $94.99
SY0-601 PDF + Engine

SY0-601 PDF + Testing Engine

$40.5  $134.99