DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CompTIA SY0-601 Exam Questions 2024 Updated: Get Ready for Exams, CompTIA Security+ (Plus) Certification | SPOTO

The best way to prepare for the CompTIA Security+ (SY0-601) certification exam is by practicing the latest exam questions. This globally recognized certification validates essential skills for core security functions and is a gateway to a successful IT security career. The SY0-601 exam content, updated for 2024, addresses the latest cybersecurity trends and techniques, focusing on critical technical skills such as risk assessment, incident response, forensics, enterprise networks, hybrid/cloud operations, and security controls. By engaging with updated exam questions, you can ensure high performance on the exam and demonstrate your proficiency in key security domains. SPOTO provides comprehensive preparation resources tailored to the SY0-601 exam, equipping you with the knowledge and skills needed to excel and achieve CompTIA Security+ certification success. Get ready for your exams with SPOTO's updated exam questions and ace your certification journey.
Take other online exams

Question #1
Which of the following job roles would sponsor data quality and data entry initiatives that ensure business and regulatory requirements are met?
A. The data owner
B. The data processor
C. The data steward
D. The data privacy officer
View answer
Correct Answer: AD
Question #2
An organization has implemented a two-step verification process to protect user access to data that 6 stored in the could Each employee now uses an email address of mobile number a code to access the data. Which of the following authentication methods did the organization implement?
A. Token key
B. Static code
C. Push notification
D. HOTP
View answer
Correct Answer: BF
Question #3
To mitigate the impact of a single VM being compromised by another VM on the same hypervisor, an administrator would like to utilize a technical control to further segregate the traffic. Which of the following solutions would BEST accomplish this objective?
A. Install a hypervisor firewall to filter east-west traffic
B. Add more VLANs to the hypervisor network switches
C. Move exposed or vulnerable VMs to the DMZ
D. Implement a zero-trust policy and physically segregate the hypervisor servers
View answer
Correct Answer: A
Question #4
An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?
A. Document the collection and require a sign-off when possession changes
B. Lock the device in a safe or other secure location to prevent theft or alteration
C. Place the device in a Faraday cage to prevent corruption of the data
D. Record the collection in a blockchain-protected public ledger
View answer
Correct Answer: A
Question #5
After reading a security bulletin, a network security manager is concerned that a malicious actor may have breached the network using the same software flaw. The exploit code is publicly available and has been reported as being used against other industries in the same vertical. Which of the following should the network security manager consult FIRST to determine a priority list for forensic review?
A. The vulnerability scan output
B. The IDS logs
C. The full packet capture data
D. The SIEM alerts
View answer
Correct Answer: A
Question #6
A security analyst is investigating an incident to determine what an attacker was able to do on a compromised laptop. The analyst reviews the following SIEM log: Which of the following describes the method that was used to compromise the laptop?
A. An attacker was able to move laterally from PC1 to PC2 using a pass-the-hash attack
B. An attacker was able to bypass application whitelisting by emailing a spreadsheet attachment with an embedded PowerShell in the file
C. An attacker was able to install malware to the CAasdf234 folder and use it to gam administrator nights and launch Outlook
D. An attacker was able to phish user credentials successfully from an Outlook user profile
View answer
Correct Answer: A
Question #7
A systems analyst is responsible for generating a new digital forensics chain-of-custody form Which of the following should the analyst Include in this documentation? (Select TWO).
A. The order of volatility
B. A checksum
C. The location of the artifacts
D. The vendor's name
E. The date and time
F. A warning banner
View answer
Correct Answer: AE
Question #8
A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger
View answer
Correct Answer: D
Question #9
A security engineer is reviewing log files after a third discovered usernames and passwords for the organization’s accounts. The engineer sees there was a change in the IP address for a vendor website one earlier. This change lasted eight hours. Which of the following attacks was MOST likely used?
A. Man-in- the middle
B. Spear-phishing
C. Evil twin
D. DNS poising
View answer
Correct Answer: C
Question #10
A security assessment determines DES and 3DES at still being used on recently deployed production servers. Which of the following did the assessment identify?
A. Unsecme protocols
B. Default settings
C. Open permissions
D. Weak encryption
View answer
Correct Answer: D
Question #11
A security researcher has alerted an organization that its sensitive user data was found for sale on a website. Which of the following should the organization use to inform the affected parties?
A. An incident response plan
B. A communications plan
C. A business continuity plan
D. A disaster recovery plan
View answer
Correct Answer: A
Question #12
A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?
A. Semi-authorized hackers
B. State actors
C. Script kiddies
D. Advanced persistent threats
View answer
Correct Answer: D
Question #13
An enterprise needs to keep cryptographic keys in a safe manner. Which of the following network appliances can achieve this goal?
A. HSM
B. CASB
C. TPM
D. DLP
View answer
Correct Answer: B
Question #14
The spread of misinformation surrounding the outbreak of a novel virus on election day ted to eligible voters choosing not to take the risk of going to the polls This is an example of:
A. prepending
B. an influence campaign
C. a watering-hole attack
D. intimidation
E. information elicitation
View answer
Correct Answer: C
Question #15
A financial analyst has been accused of violating the company’s AUP and there is forensic evidence to substantiate the allegation. Which of the following would dispute the analyst’s claim of innocence?
A. Legal hold
B. Order of volatility
C. Non-repudiation
D. Chain of custody
View answer
Correct Answer: D
Question #16
A host was infected with malware. During the incident response, Joe, a user, reported that he did not receive any emails with links, but he had been browsing the Internet all day. Which of the following would MOST likely show where the malware originated?
A. The DNS logs
B. The web server logs
C. The SIP traffic logs
D. The SNMP logs
View answer
Correct Answer: C
Question #17
An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following: Which of the following BEST describes the attack that was attempted against the forum readers?
A. SOU attack
B. DLL attack
C. XSS attack
D. API attack
View answer
Correct Answer: A
Question #18
An organization relies on third-party video conferencing to conduct daily business. Recent security changes now require all remote workers to utilize a VPN to corporate resources. Which of the following would BEST maintain high-quality video conferencing while minimizing latency when connected to the VPN?
A. Using geographic diversity to have VPN terminators closer to end users
B. Utilizing split tunneling so only traffic for corporate resources is encrypted
C. Purchasing higher-bandwidth connections to meet the increased demand
D. Configuring QoS properly on the VPN accelerators
View answer
Correct Answer: D
Question #19
A company is upgrading its wireless infrastructure to WPA2-Enterprise using EAP-TLS. Which of the following must be part of the security architecture to achieve AAA? (Select TWO)
A. DNSSEC
B. Reverse proxy
C. VPN concentrator
D. PKI
E. Active Directory
F. RADIUS
View answer
Correct Answer: A
Question #20
A network administrator at a large organization Is reviewing methods to improve the security of the wired LAN Any security improvement must be centrally managed and allow corporate-owned devices to have access to the intranet but limit others to Internet access only. Which of the following should the administrator recommend?
A. 802
B. SSO to authenticate corporate users
C. MAC address filtering with ACLs on the router
D. PAM for user account management
View answer
Correct Answer: D
Question #21
An incident, which is affecting dozens of systems, involves malware that reaches out to an Internet service for rules and updates. The IP addresses for the Internet host appear to be different in each case. The organization would like to determine a common IoC to support response and recovery actions. Which of the following sources of information would BEST support this solution?
A. Web log files
B. Browser cache
C. DNS query logs
D. Antivirus
View answer
Correct Answer: C
Question #22
In which of the following common use cases would steganography be employed?
A. Obfuscation
B. Integrity
C. Non-repudiation
D. Blockchain
View answer
Correct Answer: D
Question #23
A small business office is setting up a wireless infrastructure with primary requirements centered around protecting customer information and preventing unauthorized access to the business network. Which of the following would BEST support the office's business needs? (Select TWO)
A. Installing WAPs with strategic placement
B. Configuring access using WPA3
C. Installing a WIDS
D. Enabling MAC filtering
E. Changing the WiFi password every 30 days
F. Reducing WiFi transmit power throughout the office
View answer
Correct Answer: BD
Question #24
An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up. The ClO is also concerned about the organization's security and customer privacy. Which of the following would be BEST to address the ClO’s concerns?
A. Disallow new hires from using mobile devices for six months
B. Select four devices for the sales department to use in a CYOD model
C. Implement BYOD for the sates department while leveraging the MDM
D. Deploy mobile devices using the COPE methodology
View answer
Correct Answer: EF
Question #25
Following a prolonged datacenter outage that affected web-based sales, a company has decided to move its operations to a private cloud solution. The security team has received the following requirements: ? There must be visibility into how teams are using cloud-based services. ? The company must be able to identify when data related to payment cards is being sent to the cloud. ? Data must be available regardless of the end user's geographic location ? Administrators need a single pane-of-glass view into tra
A. Create firewall rules to restrict traffic to other cloud service providers
B. Install a DLP solution to monitor data in transit
C. Implement a CASB solution
D. Configure a web-based content filter
View answer
Correct Answer: AC
Question #26
The process of passively gathering information prior to launching a cyberattack is called:
A. tailgating
B. reconnaissance
C. pharming
D. prepending
View answer
Correct Answer: D
Question #27
After installing a Windows server, a cybersecurity administrator needs to harden it, following security best practices. Which of the following will achieve the administrator's goal? (Select TWO).
A. Disabling guest accounts
B. Disabling service accounts
C. Enabling network sharing
D. Disabling NetBIOS over TCP/IP
E. Storing LAN manager hash values
F. Enabling NTLM
View answer
Correct Answer: A
Question #28
A company is setting up a web server on the Internet that will utilize both encrypted and unencrypted web-browsing protocols. A security engineer runs a port scan against the server from the Internet and sees the following output: Which of the following steps would be best for the security engineer to take NEXT?
A. Allow DNS access from the internet
B. Block SMTP access from the Internet
C. Block HTTPS access from the Internet
D. Block SSH access from the Internet
View answer
Correct Answer: B
Question #29
A cloud administrator is configuring five compute instances under the same subnet in a VPC Three instances are required to communicate with one another, and the other two must he logically isolated from all other instances in the VPC. Which of the following must the administrator configure to meet this requirement?
A. One security group
B. Two security groups
C. Three security groups
D. Five security groups
View answer
Correct Answer: B
Question #30
A security analyst is reviewing logs on a server and observes the following output: Which of the following is the security analyst observing?
A. A rainbow table attack
B. A password-spraying attack
C. A dictionary attack
D. A keylogger attack
View answer
Correct Answer: B
Question #31
A smart switch has the ability to monitor electrical levels and shut off power to a building in the event of power surge or other fault situation. The switch was installed on a wired network in a hospital and is monitored by the facilities department via a cloud application. The security administrator isolated the switch on a separate VLAN and set up a patch routine. Which of the following steps should also be taken to harden the smart switch?
A. Set up an air gap for the switch
B. Change the default password for the switch
C. Place the switch In a Faraday cage
D. Install a cable lock on the switch
View answer
Correct Answer: B
Question #32
Joe. a security analyst, recently performed a network discovery to fully understand his organization's electronic footprint from a "public" perspective. Joe ran a set of commands and received the following output: Which of the following can be determined about the organization's public presence and security posture? (Select TWO).
A. Joe used Who is to produce this output
B. Joe used cURL to produce this output
C. Joe used Wireshark to produce this output
D. The organization has adequate information available in public registration
E. The organization has too much information available in public registration
F. The organization has too little information available in public registration
View answer
Correct Answer: D
Question #33
A network technician is installing a guest wireless network at a coffee shop. When a customer purchases an Item, the password for the wireless network is printed on the recent so the customer can log in. Which of the following will the technician MOST likely configure to provide the highest level of security with the least amount of overhead?
A. WPA-EAP
B. WEP-TKIP
C. WPA-PSK
D. WPS-PIN
View answer
Correct Answer: D
Question #34
A new vulnerability in the SMB protocol on the Windows systems was recently discovered, but no patches are currently available to resolve the issue. The security administrator is concerned tf servers in the company's DMZ will be vulnerable to external attack; however, the administrator cannot disable the service on the servers, as SMB is used by a number of internal systems and applications on the LAN. Which of the following TCP ports should be blocked for all external inbound connections to the DMZ as a wo
A. 135
B. 139
C. 143
D. 161
E. 443
F. 445
View answer
Correct Answer: D
Question #35
Which of the following BEST explains the reason why a server administrator would place a document named password.txt on the desktop of an administrator account on a server?
A. The document is a honeyfile and is meant to attract the attention of a cyberintruder
B. The document is a backup file if the system needs to be recovered
C. The document is a standard file that the OS needs to verify the login credentials
D. The document is a keylogger that stores all keystrokes should the account be compromised
View answer
Correct Answer: A

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: