DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Free CompTIA Security+ SY0-601 Exam Questions - Practice Test Dump

Exam NameCompTIA Security+
Exam CodeSY0-601
Exam Price$392 (USD)
Duration90 mins
Number of Questions90
Passing Score750 / 900
Practice ExamCompTIA SY0-601 Certification Practice Exam

Download this free CompTIA Security+ SY0-601 exam dump to get real practice test questions. This Security+ exam question dump serves as a practice test to help you prepare.

Take other online exams

Question #1
A company would like to protect credit card information that is stored in a database from being exposed and reused. However, the current POS system does not support encryption. Which of the following would be BEST suited to secure this information?
A. asking
B. okenization
C. IP
D. SU/TLS
View answer
Correct Answer: B
Question #2
An upcoming project focuses on secure communications and trust between external parties. Which of the following security components will need to be considered to ensure a chosen trust provider is used and the selected option is highly scalable?
A. elf-signed certificate
B. ertificate attributes
C. ublic key infrastructure
D. omain validation
View answer
Correct Answer: C
Question #3
A security administrator needs to block a TCP connection using the corporate firewall. Because this connection is potentially a threat, the administrator does not want to send back an RST. Which of the following actions in the firewall rule would work BEST?
A. rop
B. eject
C. og alert
D. ermit
View answer
Correct Answer: A
Question #4
A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?
A. ollard
B. amera
C. larms
D. ignage
E. ccess control vestibule
View answer
Correct Answer: A
Question #5
Which of the following would satisfy three-factor authentication requirements?
A. assword, PIN, and physical token
B. IN, fingerprint scan, and iris scan
C. assword, fingerprint scan, and physical token
D. IN, physical token, and ID card
View answer
Correct Answer: C
Question #6
Which of the following measures the average time that equipment will operate before it breaks?
A. LE
B. TBF
C. TO
D. RO
View answer
Correct Answer: B
Question #7
Which of the following controls would provide the BEST protection against tailgating?
A. ccess control vestibule
B. losed-circuit television
C. roximity card reader
D. araday cage
View answer
Correct Answer: A
Question #8
A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the BEST way to secure a replacement computer and deter future theft?
A. nstalling proximity card readers on all entryway doors
B. eploying motion sensor cameras in the lobby
C. ncrypting the hard drive on the new desktop
D. sing cable locks on the hardware
View answer
Correct Answer: D
Question #9
Which of the following BEST describes a technique that compensates researchers for finding vulnerabilities?
A. enetration testing
B. ode review
C. ardriving
D. ug bounty
View answer
Correct Answer: D
Question #10
A security analyst is reviewing computer logs because a host was compromised by malware. After the computer was infected, it displayed an error screen and shut down. Which of the following should the analyst review FIRST to determine more information?
A. ump file
B. ystem log
C. eb application log
D. ecurity log
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: