ExamGecko
Home / CompTIA / SY0-601
Ask Question

SY0-601: CompTIA Security+

Vendor:
Exam Questions:
603
 Learners
  2.370
Last Updated
February - 2025
Language
English
16 Quizzes
PDF | VPLUS

Exam Number: SY0-601

Exam Name: CompTIA Security+

Length of test: 90 mins

Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.

Exam Language: English

Number of questions in the actual exam: Maximum of 90 questions

Passing Score: 750/900

The competency level required for the CompTIA SY0-601 Exam is entry-level to intermediate, suitable for individuals with basic to moderate experience in IT security.

This study guide should help you understand what to expect on SY0-601 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?

Become a Premium Member for full access
  Unlock Premium Member

A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?

A new firewall rule is needed to access the application.
A new firewall rule is needed to access the application.
The system was quarantined for missing software updates.
The system was quarantined for missing software updates.
The software was not added to the application whitelist.
The software was not added to the application whitelist.
The system was isolated from the network due to infected software
The system was isolated from the network due to infected software
Suggested answer: C
Explanation:

The most likely cause of the document-scanning software program not responding when launched by the end user is that the software was not added to the application whitelist. An application whitelist is a list of approved software applications that are allowed to run on a system. If the software is not on the whitelist, it may be blocked from running by the system's security policies. Adding the software to the whitelist should resolve the issue and allow the program to run.

Reference: https://www.techopedia.com/definition/31541/application-whitelisting

asked 02/10/2024
Moraes, Jefferson
45 questions

Which Of the following will provide the best physical security countermeasures to Stop intruders?

(Select two).

Alarm
Alarm
Signage
Signage
Lighting
Lighting
Access control vestibules
Access control vestibules
Fencing
Fencing
Sensors
Sensors
Suggested answer: C, E
Explanation:

Lighting and fencing are physical security countermeasures that can deter or stop intruders from accessing a facility or an asset. Lighting can increase visibility and reduce hiding spots for intruders, while fencing can create a physical barrier and limit access points for intruders.

asked 02/10/2024
Penny Chang
47 questions

Which of the following can be used to calculate the total loss expected per year due to a threat targeting an asset?

EF x asset value
EF x asset value
ALE / SLE
ALE / SLE
MTBF x impact
MTBF x impact
SLE x ARO
SLE x ARO
Suggested answer: D
Explanation:

The total loss expected per year due to a threat targeting an asset can be calculated using the Single Loss Expectancy (SLE) multiplied by the Annualized Rate of Occurrence (ARO). SLE is the monetary loss expected from a single event, while ARO is the estimated frequency of that event occurring in a year. Reference: CompTIA Security+ Study Guide: Exam SY0-501, 7th Edition, by Emmett Dulaney and Chuck Easttom, Chapter 9: Risk Management, page 414.

asked 02/10/2024
Leandro Zaneratto
46 questions

A penetration tester was able to compromise a host using previously captured network traffic. Which of the following is the result of this action?

Integer overflow
Integer overflow
Race condition
Race condition
Memory leak
Memory leak
Replay attack
Replay attack
Suggested answer: D
Explanation:

A replay attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed12. This can allow an attacker to compromise a host by resending a previously captured message, such as a password or a session token, that looks legitimate to the receiver1. A replay attack can be prevented by using methods such as random session keys, timestamps, or one-time passwords that expire after use12. A replay attack is different from an integer overflow, which is a type of software vulnerability that occurs when an arithmetic operation attempts to create a numeric value that is too large to be represented within the available storage space3. A race condition is another type of software vulnerability that occurs when multiple processes access and manipulate the same data concurrently, and the outcome depends on the order of execution3. A memory leak is a type of software defect that occurs when a program fails to release memory that is no longer needed, causing the program to consume more memory than necessary and potentially affecting the performance or stability of the system3.

asked 02/10/2024
Instel SL
28 questions

A candidate attempts to go to but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following best describes this type of attack?

Reconnaissance
Reconnaissance
Impersonation
Impersonation
Typosquatting
Typosquatting
Watering-hole
Watering-hole
Suggested answer: C
Explanation:

Typosquatting is a type of cyberattack that involves registering domains with deliberately misspelled names of well-known websites. The attackers do this to lure unsuspecting visitors to alternative websites, typically for malicious purposes. Visitors may end up at these alternative websites by inadvertently mistyping the name of popular websites into their web browser or by being lured by a phishing scam. The attackers may emulate the look and feel of the legitimate websites and trick users into entering sensitive information or downloading malware.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.kaspersky.com/resource-center/definitions/what-is-typosquatting

asked 02/10/2024
Lee Greenshields
37 questions

Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?

DLP
DLP
TLS
TLS
AV
AV
IDS
IDS
Suggested answer: A
Explanation:

DLP stands for data loss prevention, which is a set of tools and processes that aim to prevent unauthorized access, use, or transfer of sensitive data. DLP can help mitigate the risk of data exfiltration by disgruntled employees or external attackers by monitoring and controlling data flows across endpoints, networks, and cloud services. DLP can also detect and block attempts to copy, transfer, or upload sensitive data to a USB drive or other removable media based on predefined policies and rules.

Reference: https://www.comptia.org/certifications/security#examdetails https://www.comptia.org/content/guides/comptia-security-sy0-601-exam-objectives https://www.microsoft.com/en-us/security/business/security-101/what-is-data-loss-prevention-dlp

asked 02/10/2024
Kellen Winters
40 questions

one of the attendees starts to notice delays in the connection. and the HTTPS site requests are reverting to HTTP. Which of the following BEST describes what is happening?

Birthday collision on the certificate key
Birthday collision on the certificate key
DNS hacking to reroute traffic
DNS hacking to reroute traffic
Brute force to the access point
Brute force to the access point
A SSL/TLS downgrade
A SSL/TLS downgrade
Suggested answer: D
Explanation:

The scenario describes a Man-in-the-Middle (MitM) attack where the attacker intercepts traffic and downgrades the secure SSL/TLS connection to an insecure HTTP connection. This type of attack is commonly known as SSL/TLS downgrade attack or a stripping attack. The attacker is able to see and modify the communication between the client and server.

asked 02/10/2024
Venish Arumugam
35 questions

DRAG DROP

A data owner has been tasked with assigning proper data classifications and destruction methods for various types of data contained within the environment.


CompTIA SY0-601 image Question 1 98690 10022024055400000
Correct answer: CompTIA SY0-601 image answer Question 1 98690 10022024055400000
Explanation:

CompTIA SY0-601 image Question 1 explanation 98690 10022024175400000000

asked 02/10/2024
Shivanth Jha
36 questions

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system Which of the following would detect this behavior?

Become a Premium Member for full access
  Unlock Premium Member