DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CompTIA Security+ SY0-601 Exam Questions - Free Practice Test Questions

xam NameCompTIA Security+
Exam CodeSY0-601
Exam Price$392 (USD)
Duration90 mins
Number of Questions90
Passing Score750 / 900

Prepare for the CompTIA Security+ SY0-601 certification exam with this free practice test. Get access to Security+ exam questions and answers to help you pass the test.

Take other online exams

Question #1
Which of the following is the most common data loss path for an air-gapped network?
A. astion host
B. nsecured Bluetooth
C. npatched OS
D. emovable devices
View answer
Correct Answer: D
Question #2
A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
A. esting input validation on the user input fields
B. erforming code signing on company-developed software
C. erforming static code analysis on the software
D. nsuring secure cookies are used
View answer
Correct Answer: B
Question #3
Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider?
A. oftware as a service
B. nfrastructure as code
C. nternet of Things
D. oftware-defined networking
View answer
Correct Answer: D
Question #4
Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?
A. emote access points should fail closed
B. ogging controls should fail open
C. afety controls should fail open
D. ogical security controls should fail closed
View answer
Correct Answer: D
Question #5
A technician notices an HTTP log-in page on a vulnerability scan report. Upon accessing the log-in page, the technician uses "admin" as both the username and the password to log in and access a security camera feed. Which of the following best describes the attack vector?
A. efault credentials
B. mpersonation
C. pen service ports
D. yposquatting
View answer
Correct Answer: A
Question #6
Which of the following would be the best resource for a software developer who is looking to improve secure coding practices for web applications?
A. WASP
B. ulnerability scan results
C. IST CSF
D. hird-party libraries
View answer
Correct Answer: A
Question #7
A website visitor is required to provide properly formatted information in a specific field on a website form. Which of the following security measures is most likely used for this mandate?
A. nput validation
B. ode signing
C. QL injection
D. orm submission
View answer
Correct Answer: A
Question #8
A systems technician is setting up a public-facing web server that needs to ensure traffic is secure. Which of the following steps should the systems technician take to begin this process?
A. omain validation
B. NS filtering
C. ildcard creation
D. SR generation
View answer
Correct Answer: D
Question #9
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?
A. apacity planning
B. edundancy
C. eographic dispersion
D. abletop exercise
View answer
Correct Answer: A
Question #10
An application security engineer is working to address issues stemming from situations where necessary approvals and testing were not done before code was introduced into the production environment. Which of the following would be the most appropriate for the engineer to configure?
A. egression testing
B. ranch protection
C. mpact analysis
D. hange control board
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: