Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CompTIA > CompTIA Certifications > SY0-601 > SY0-601 Online Practice Questions and Answers

SY0-601 Online Practice Questions and Answers

Questions 4

An employee, receives an email stating he won the lottery. The email includes a link that requests a name, mobile phone number, address, and date of birth be provided to confirm employee's identity before sending him the prize. Which of the following BEST describes this type of email?

A. Spear phishing

B. Whaling

C. Phishing

D. Vishing

Buy Now

Correct Answer: C

Questions 5

When used at the design stage, which of the following improves the efficiency, accuracy, and speed of a database?

A. Tokenization

B. Data masking

C. Normalization

D. Obfuscation

Buy Now

Correct Answer: C

Reference: https://www.informit.com/articles/article.aspx?p=30646

Questions 6

The Chief Information Secunty Officer came across a news arbcle outining a mechan'sm thal allows certan OS passwords to be bypassed The security team was then tasked with determining which method could be used to prevent data loss in the corporate environment in case an attacker bypasses authentication Which of the following will accomplish this objective?

A. FDE

B. Proper patch management protocols

C. TPM

D. Input validations

Buy Now

Correct Answer: A

Questions 7

Which of the following uses SAML for authentication?

A. TOTP

B. Federation

C. Kerberos

D. HOTP

Buy Now

Correct Answer: B

Federation, or identity federation, defines policies, protocols, and practices to manage identities across systems and organizations. Federation's ultimate goal is to allow users to seamlessly access data or systems across domains. Federation is enabled through the use of industry standards such as Security Assertion Markup Language (SAML).

Questions 8

A security analyst is receiving several alerts per user and is trying to determine If various logins are malicious. The security analyst would like to create a baseline of normal operations and reduce noise. Which of the following actions should the security analyst perform?

A. Adjust the data flow from authentication sources to the SIEM.

B. Disable email alerting and review the SIEM directly.

C. Adjust the sensitivity levels of the SIEM correlation engine.

D. Utilize behavioral analysis to enable the SIEM's learning mode.

Buy Now

Correct Answer: D

Utilize behavioral analysis to enable the SIEM's learning mode.

UBA or User Behavior Analytics and is a threat detection analysis technology that uses AI to understand how users normally behave and then find anomalous activities, which deviate from their normal behavior and may be indicative of a threat.

For this scenario, the SIEM will first learn what is normal behavior then when a baseline is created, it will know if any of the logins are malicious. Likely determined by when and where the logins are occurring and if it's different from the baseline. This should hopefully reduce the amount of alerts occurring.

Questions 9

A user reset the password for a laptop but has been unable to log in to it since then. In addition, several unauthorized emails were sent on the user's behalf recently. The security team investigates the issue and identifies the following findings:

Firewall logs show excessive traffic from the laptop to an external site.

Unknown processes were running on the laptop.

RDP connections that appeared to be authorized were made to other network devices from the laptop.

High bandwidth utilization alerts from that user's username.

Which of the following is most likely installed on the laptop?

A. Worm

B. Keylogger

C. Trojan

D. Logic bomb

Buy Now

Correct Answer: C

Questions 10

A security team is engaging a third-party vendor to do a penetration test of a new proprietary application prior to its release. Which of the following documents would the third-party vendor most likely be required to review and sign?

A. SLA

B. NDA

C. MOU

D. AUP

Buy Now

Correct Answer: B

NDA stands for Non-Disclosure Agreement, which is a legal contract that binds the parties to keep confidential information secret and not to disclose it to unauthorized parties. A third-party vendor who is doing a penetration test of a new proprietary application would most likely be required to review and sign an NDA to protect the intellectual property and trade secrets of the security team.

Questions 11

A company reduced the area utilized in its data center by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?

A. IaC

B. MSSP

C. Containers

D. SaaS

Buy Now

Correct Answer: A

The scenario described is an example of Infrastructure as Code (IaC). IaC is a key devOps practice that involves managing and provisioning computing infrastructure through machine-readable script files, rather than through physical hardware configuration or interactive configuration tools. This approach can help in automating the process of setting up, changing, and versioning infrastructure efficiently and it can be particularly useful in managing virtualized and cloud-based services, which is the case in the scenario provided.

Questions 12

A penetration-testing firm is working with a local community bank to create a proposal that best fits the needs of the bank. The bank's information security manager would like the penetration test to resemble a real attack scenario, but it cannot afford the hours required by the penetration-testing firm. Which of the following would best address the bank's desired scenario and budget?

A. Engage the penetration-testing firm's rea-team services to fully mimic possible attackers.

B. Give the penetration tester data diagrams of core banking applications in a known-environment test.

C. Limit the scope of the penetration test to only the system that is used for teller workstations.

D. Provide limited networking details in a partially known-environment test to reduce reconnaissance efforts.

Buy Now

Correct Answer: D

Questions 13

While considering the organization's cloud-adoption strategy, the Chief Information Security Officer sets a goal to outsource patching of firmware, operating systems, and applications to the chosen cloud vendor. Which of the following best meets this goal?

A. Community cloud

B. PaaS

C. Containerization

D. Private cloud

E. SaaS

F. IaaS

Buy Now

Correct Answer: E

Exam Code: SY0-601
Exam Name: CompTIA Security+
Last Update: Jun 09, 2025
Questions: 1334

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.