SY0-601: CompTIA Security+
Exam Number: SY0-601
Exam Name: CompTIA Security+
Length of test: 90 mins
Exam Format: Multiple-choice, Drag and Drop, and HOTSPOT questions.
Exam Language: English
Number of questions in the actual exam: Maximum of 90 questions
Passing Score: 750/900
The competency level required for the CompTIA SY0-601 Exam is entry-level to intermediate, suitable for individuals with basic to moderate experience in IT security.
This study guide should help you understand what to expect on SY0-601 exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.
Related questions
A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?
A desktop support technician recently installed a new document-scanning software program on a computer. However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?
The most likely cause of the document-scanning software program not responding when launched by the end user is that the software was not added to the application whitelist. An application whitelist is a list of approved software applications that are allowed to run on a system. If the software is not on the whitelist, it may be blocked from running by the system's security policies. Adding the software to the whitelist should resolve the issue and allow the program to run.
Reference: https://www.techopedia.com/definition/31541/application-whitelisting
Which Of the following will provide the best physical security countermeasures to Stop intruders?
(Select two).
Which of the following can be used to calculate the total loss expected per year due to a threat targeting an asset?
A penetration tester was able to compromise a host using previously captured network traffic. Which of the following is the result of this action?
A candidate attempts to go to but accidentally visits http://comptiia.org. The malicious website looks exactly like the legitimate website. Which of the following best describes this type of attack?
Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?
one of the attendees starts to notice delays in the connection. and the HTTPS site requests are reverting to HTTP. Which of the following BEST describes what is happening?
The scenario describes a Man-in-the-Middle (MitM) attack where the attacker intercepts traffic and downgrades the secure SSL/TLS connection to an insecure HTTP connection. This type of attack is commonly known as SSL/TLS downgrade attack or a stripping attack. The attacker is able to see and modify the communication between the client and server.
DRAG DROP
A data owner has been tasked with assigning proper data classifications and destruction methods for various types of data contained within the environment.
A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system Which of the following would detect this behavior?
Question