Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SY0-601 Exam Dumps - CompTIA Security+ Questions and Answers

Question # 204

Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

Options:

A.

Air gap

B.

Barricade

C.

Port security

D.

Screened subnet

Buy Now
Question # 205

An organization developed a virtual thin client running in kiosk mode mat is used to access various software depending on the users' roles During a security evaluation, the test team identified the ability to exit kiosk mode and access system-level resources which led to privilege escalation Which of the following mitigations addresses this finding?

Options:

A.

Using application approved/dented lists

B.

Incorporating web content filtering

C.

Enforcing additional firewall rules

D.

Implementing additional network segmentation

Buy Now
Question # 206

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?

Options:

A.

Clustering servers

B.

Geographic dispersion

C.

Load balancers

D.

Off-site backups

Buy Now
Question # 207

While investigating a recent security breach an analyst finds that an attacker gained access by SQL injection through a company website Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

Options:

A.

Secure cookies

B.

Input sanitization

C.

Code signing

D.

Blocklist

Buy Now
Question # 208

A company policy states that all new SaaS applications must authenticate users through a centralized service. Which of the following authentication types should most likely be configured in order to comply with this policy?

Options:

A.

SSO

B.

RADIUS

C.

OpenID

D.

Kerberos

E.

CHAP

Buy Now
Question # 209

A company wants to begin taking online orders for products but has decided to outsource payment processing to limit risk. Which of the following best describes what the company should request from the payment processor?

Options:

A.

ISO 27001 certification documents

B.

Proof of PCI DSS compliance

C.

A third-party SOC 2 Type 2 report

D.

Audited GDPR policies

Buy Now
Question # 210

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

Options:

A.

Key stretching

B.

Data masking

C.

Steganography

D.

Salting

Buy Now
Question # 211

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

Options:

A.

Risk tolerance

B.

Risk transfer

C.

Risk register

D.

Risk analysis

Buy Now
Question # 212

A systems administrator would like to set up a system that will make it difficult or impossible to deny that someone has performed an action. Which of the following is the administrator trying to accomplish?

Options:

A.

Non-repudiation

B.

Adaptive identity

C.

Security zones

D.

Deception and disruption

Buy Now
Question # 213

An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?

Options:

A.

Recovery point objective

B.

Mean time between failures

C.

Recovery time objective

D.

Mean time to repair

Buy Now
Question # 214

A company executive experienced a security issue at an airport Photos taken during a strategy meeting were stolen when the executive used a free smartphone-charging station. Which of the following can be used to prevent this from occurring in the future?

Options:

A.

Cable locks

B.

Screened subnets

C.

Faraday cages

D.

Data blockers

Buy Now
Question # 215

A security analyst is assessing several company firewalls. Which of the following tools would the analyst most likely use to generate custom packets to use during the assessment?

Options:

A.

hping

B.

Wireshark

C.

PowerShell

D.

netstat

Buy Now
Question # 216

Which of the following can be used to identify potential attacker activities without affecting production servers?

Options:

A.

Honeypot

B.

Video surveillance

C.

Zero Trust

D.

Geofencing

Buy Now
Question # 217

A systems administrator set up a perimeter firewall but continues to notice suspicious connections between internal endpoints. Which of the following should be set up in order to mitigate the threat posed by the suspicious activity?

Options:

A.

Host-based firewall

B.

Web application firewall

C.

Access control list

D.

Application allow list

Buy Now
Question # 218

An organization has too many variations of a single operating system and needs to standardize the arrangement prior to pushing the system image to users. Which of the following should the organization implement first?

Options:

A.

Standard naming convention

B.

Hashing

C.

Network diagrams

D.

Baseline configuration

Buy Now
Question # 219

A security analyst at an organization observed several user logins from outside the organization's network The analyst determined that these logins were not performed by individuals within the organization Which of the following recommendations would reduce the likelihood of future attacks? (Select two).

Options:

A.

Disciplinary actions for users

B.

Conditional access policies

C.

More regular account audits

D.

implementation of additional authentication factors

E.

Enforcement of content filtering policies

F.

A review of user account permissions

Buy Now
Question # 220

A company requires that all user authentication against a core directory service must be secure. Which of the following should the company implement to meet this requirement?

Options:

A.

S/MIME

B.

SRTP

C.

LDAPS

D.

DNSSEC

Buy Now
Question # 221

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?

Options:

A.

Corrective

B.

Preventive

C.

Detective

D.

Deterrent

Buy Now
Question # 222

While performing digital forensics. which of the following is considered the most volatile and should have the contents collected first?

Options:

A.

Hard drive

B.

RAM

C.

SSD

D.

Temporary files

Buy Now
Question # 223

A client demands at least 99.99% uptime from a service provider's hosted security services. Which of the following documents includes the information the service provider should return to the client?

Options:

A.

MOA

B.

SOW

C.

MOU

D.

SLA

Buy Now
Exam Code: SY0-601
Exam Name: CompTIA Security+ Exam 2023
Last Update: Feb 23, 2025
Questions: 1063
SY0-601 pdf

SY0-601 PDF

$25.5  $84.99
SY0-601 Engine

SY0-601 Testing Engine

$28.5  $94.99
SY0-601 PDF + Engine

SY0-601 PDF + Testing Engine

$40.5  $134.99