DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare Efficiently CompTIA SY0-601 Exam Questions, CompTIA Security+ (Plus) Certification | SPOTO

Prepare efficiently for the CompTIA SY0-601 exam with SPOTO's comprehensive study materials and exam questions. Our resources include practice tests, sample questions, exam dumps, and mock exams, providing a robust platform for effective exam preparation. Engage with our online exam questions to identify knowledge gaps and enhance your core technical skills in risk assessment, incident response, and network security. CompTIA Security+ (SY0-601) covers the latest cybersecurity trends and techniques, ensuring proficiency in critical IT security areas. This globally recognized certification validates essential skills for performing core security functions and advancing in an IT security career. SPOTO's exam materials encompass a wide range of topics, including forensics, enterprise networks, and security controls, preparing you efficiently for success in the exam and in your IT security profession. Utilize SPOTO's study resources to prepare efficiently for the CompTIA SY0-601 exam and achieve your certification goals.
Take other online exams

Question #1
After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
A. The vulnerability scan output
B. The IDS logs C
View answer
Correct Answer: A
Question #2
An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will use data feeds obtained from passport systems, passenger manifests, and high-definition video feeds from CCTV systems that are located at the ports. The service will incorporate machine-learning techniques to eliminate biometric enrollment processes while still allowing authorities to identify passengers with increasing accuracy over time. The more frequently passengers travel, th
A. Voice
B. Gait
C. Vein
D. Facial
E. Retina
F. Fingerprint
View answer
Correct Answer: D
Question #3
A root cause analysis reveals that a web application outage was caused by one of the company’s developers uploading a newer version of the third-party libraries that were shared among several applications. Which of the following implementations would be BEST to prevent the issue from reoccurring?
A. CASB
B. SWG
C. Containerization
D. Automated failover
View answer
Correct Answer: A
Question #4
A cybersecurity manager has scheduled biannual meetings with the IT team and department leaders to discuss how they would respond to hypothetical cyberattacks. During these meetings, the manager presents a scenario and injects additional information throughout the session to replicate what might occur in a dynamic cybersecurity event involving the company, its facilities, its data, and its staff. Which of the following describes what the manager is doing?
A. Developing an incident response plan
B. Building a disaster recovery plan
C. Conducting a tabletop exercise
D. Running a simulation exercise
View answer
Correct Answer: AB
Question #5
A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?
A. Configure the perimeter firewall to deny inbound external connections to SMB ports
B. Ensure endpoint detection and response systems are alerting on suspicious SMB connections
C. Deny unauthenticated users access to shared network folders
D. Verify computers are set to install monthly operating system, updates automatically
View answer
Correct Answer: A
Question #6
A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would BEST prevent this from reoccurring?
A. Create a new acceptable use policy
B. Segment the network into trusted and untrusted zones
C. Enforce application whitelisting
D. Implement DLP at the network boundary
View answer
Correct Answer: C
Question #7
A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output: Which of the following is the router experiencing?
A. DDoS attack
B. Memory leak
C. Buffer overflow
D. Resource exhaustion
View answer
Correct Answer: B
Question #8
A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models. When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?
A. The most common set of MDM configurations will become the effective set of enterprise mobile security controls
B. All devices will need to support SCEP-based enrollment; therefore, the heterogeneity of the chosen architecture may unnecessarily expose private keys to adversaries
C. Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors
D. MDMs typically will not support heterogeneous deployment environments, so multiple MDMs will need to be installed and configured
View answer
Correct Answer: C
Question #9
A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?
A. An air gap
B. A Faraday cage
C. A shielded cable
D. A demilitarized zone
View answer
Correct Answer: A
Question #10
A company recently set up an e-commerce portal to sell its product online. The company wants to start accepting credit cards for payment, which requires compliance with a security standard. Which of the following standards must the company comply with before accepting credit cards on its e-commerce platform?
A. PCI DSS
B. ISO 22301
C. ISO 27001
D. NIST CSF
View answer
Correct Answer: C
Question #11
A development team employs a practice of bringing all the code changes from multiple team members into the same development project through automation. A tool is utilized to validate the code and track source code through version control. Which of the following BEST describes this process?
A. Continuous delivery
B. Continuous integrationC
D. Continuous monitoring
View answer
Correct Answer: A
Question #12
A large industrial system’s smart generator monitors the system status and sends alerts to third-party maintenance personnel when critical failures occur. While reviewing the network logs, the company’s security manager notices the generator’s IP is sending packets to an internal file server’s IP. Which of the following mitigations would be BEST for the security manager to implement while maintaining alerting capabilities?
A. Segmentation B
View answer
Correct Answer: B
Question #13
While checking logs, a security engineer notices a number of end users suddenly downloading files with the .tar.gz extension. Closer examination of the files reveals they are PE32 files. The end users state they did not initiate any of the downloads. Further investigation reveals the end users all clicked on an external email containing an infected MHT file with an href link a week prior. Which of the following is MOST likely occurring?
A. A RAT was installed and is transferring additional exploit tools
B. The workstations are beaconing to a command-and-control server
C. A logic bomb was executed and is responsible for the data transfers
D. A fireless virus is spreading in the local network environment
View answer
Correct Answer: D
Question #14
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
A. SSAE SOC 2
B. PCI DSS
C. GDPR
D. ISO 31000
View answer
Correct Answer: A
Question #15
SIMULATION A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites. INSTRUCTIONS Click on each firewall to do the following: 1. Deny cleartext web traffic. 2. Ensure secure management protocols are used. 3. Resolve issues at the DR site. The ruleset order cannot be modified due to outside constraints. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
SIMULATION A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites
View answer
Correct Answer: S
Question #16
Several employees return to work the day after attending an industry trade show. That same day, the security manager notices several malware alerts coming from each of the employee’s workstations. The security manager investigates but finds no signs of an attack on the perimeter firewall or the NIDS. Which of the following is MOST likely causing the malware alerts?
A. A worm that has propagated itself across the intranet, which was initiated by presentation media
B. A fileless virus that is contained on a vCard that is attempting to execute an attack
C. A Trojan that has passed through and executed malicious code on the hosts
D. A USB flash drive that is trying to run malicious code but is being blocked by the host firewall
View answer
Correct Answer: C
Question #17
A security auditor is reviewing vulnerability scan data provided by an internal security team. Which of the following BEST indicates that valid credentials were used?
A. The scan results show open ports, protocols, and services exposed on the target host
B. The scan enumerated software versions of installed programs
C. The scan produced a list of vulnerabilities on the target host
D. The scan identified expired SSL certificates
View answer
Correct Answer: C
Question #18
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users’ reports of issues accessing the facility. Which of the following MOST likely indicates the cause of the access issues?
A. False rejection B
View answer
Correct Answer: B
Question #19
The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company’s Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards. Which of the following social-engineering techniques is the attacker using?
A. Phishing
B. Whaling
C. Typo squatting
D. Pharming
View answer
Correct Answer: C
Question #20
The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?
A. Limit the use of third-party libraries
B. Prevent data exposure queries
C. Obfuscate the source code
D. Submit the application to QA before releasing it
View answer
Correct Answer: C
Question #21
An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?
A. The theft of portable electronic devices
B. Geotagging in the metadata of images
C. Bluesnarfing of mobile devices
D. Data exfiltration over a mobile hotspot
View answer
Correct Answer: C
Question #22
A Chief Security Officer (CSO) is concerned about the amount of PII that is stored locally on each salesperson’s laptop. The sales department has a higher-than-average rate of lost equipment. Which of the following recommendations would BEST address the CSO’s concern?
A. Deploy an MDM solution
B. Implement managed FDE
C. Replace all hard drives with SEDs
D. Install DLP agents on each laptop
View answer
Correct Answer: C
Question #23
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hotspots?
A. Footprinting
B. White-box testing C
View answer
Correct Answer: A
Question #24
An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: Check- in/checkout of credentials The ability to use but not know the password Automated password changes Logging of access to credentials Which of the following solutions would meet the requirements?
A. OAuth 2
B. Secure Enclave
C. A privileged access management system
D. An OpenID Connect authentication system
View answer
Correct Answer: D
Question #25
A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user’s inability to connect the laptop to the VPN?
A. Due to foreign travel, the user’s laptop was isolated from the network
B. The user’s laptop was quarantined because it missed the latest path update
C. The VPN client was blacklisted
D. The user’s account was put on a legal hold
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: