Memorial Day Flat 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s55disc

SY0-601 PDF

$42.75

$94.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SY0-601 PDF + Testing Engine

$63

$139.99

3 Months Free Update

  • Exam Name: CompTIA Security+ Exam 2021
  • Last Update: Jun 9, 2021
  • Questions and Answers: 281
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SY0-601 Engine

$49.5

$109.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SY0-601 CompTIA Security+ Exam 2021 Questions and Answers

Question # 4

A security analyst is looking for a solution to help communicate to the leadership team the seventy levels of the organization’s vulnerabilities. Which of the following would BEST meet this need?

A.

CVE

B.

SIEM

C.

SOAR

D.

CVSS

Full Access
Question # 5

Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

A.

SSAE SOC 2

B.

PCI DSS

C.

GDPR

D.

ISO 31000

Full Access
Question # 6

An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include:

  • Check-in/checkout of credentials
  • The ability to use but not know the password
  • Automated password changes
  • Logging of access to credentials

Which of the following solutions would meet the requirements?

A.

OAuth 2.0

B.

Secure Enclave

C.

A privileged access management system

D.

An OpenID Connect authentication system

Full Access
Question # 7

Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)

A.

COPE

B.

VDI

C.

GPS

D.

TOTP

E.

RFID

F.

BYOD

Full Access
Question # 8

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Choose two.)

A.

Data accessibility

B.

Legal hold

C.

Cryptographic or hash algorithm

D.

Data retention legislation

E.

Value and volatility of data

F.

Right-to-audit clauses

Full Access
Question # 9

To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?

A.

A password reuse policy

B.

Account lockout after three failed attempts

C.

Encrypted credentials in transit

D.

A geofencing policy based on login history

Full Access
Question # 10

A user contacts the help desk to report the following:

  • Two days ago, a pop-up browser window prompted the user for a name and password after connecting to the corporate wireless SSID. This had never happened before, but the user entered the information as requested.
  • The user was able to access the Internet but had trouble accessing the department share until the next day.
  • The user is now getting notifications from the bank about unauthorized transactions.

Which of the following attack vectors was MOST likely used in this scenario?

A.

Rogue access point

B.

Evil twin

C.

DNS poisoning

D.

ARP poisoning

Full Access
Question # 11

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?

A.

An air gap

B.

A Faraday cage

C.

A shielded cable

D.

A demilitarized zone

Full Access
Question # 12

A researcher has been analyzing large data sets for the last ten months. The researcher works with colleagues from other institutions and typically connects via SSH to retrieve additional data. Historically, this setup has worked without issue, but the researcher recently started getting the following message:

Which of the following network attacks is the researcher MOST likely experiencing?

A.

MAC cloning

B.

Evil twin

C.

Man-in-the-middle

D.

ARP poisoning

Full Access
Question # 13

A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)

A.

Trusted Platform Module

B.

A host-based firewall

C.

A DLP solution

D.

Full disk encryption

E.

A VPN

F.

Antivirus software

Full Access
Question # 14

Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?

A.

DNSSEC and DMARC

B.

DNS query logging

C.

Exact mail exchanger records in the DNS

D.

The addition of DNS conditional forwarders

Full Access
Question # 15

A network administrator would like to configure a site-to-site VPN utilizing iPSec. The administrator wants the tunnel to be established with data integrity encryption, authentication and anti- replay functions Which of the following should the administrator use when configuring the VPN?

A.

AH

B.

EDR

C.

ESP

D.

DNSSEC

Full Access
Question # 16

Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?

A.

MOU

B.

MTTR

C.

SLA

D.

NDA

Full Access
Question # 17

A security analyst is investigation an incident that was first reported as an issue connecting to network shares and the internet, While reviewing logs and tool output, the analyst sees the following:

Which of the following attacks has occurred?

A.

IP conflict

B.

Pass-the-hash

C.

MAC flooding

D.

Directory traversal

E.

ARP poisoning

Full Access
Question # 18

An auditor is performing an assessment of a security appliance with an embedded OS that was vulnerable during the last two assessments. Which of the following BEST explains the appliance’s vulnerable state?

A.

The system was configured with weak default security settings.

B.

The device uses weak encryption ciphers.

C.

The vendor has not supplied a patch for the appliance.

D.

The appliance requires administrative credentials for the assessment.

Full Access
Question # 19

A company has limited storage available and online presence that cannot for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time In the event of a failure, which being maindful of the limited available storage space?

A.

Implement fulltape backup every Sunday at 8:00 p.m and perform nightly tape rotations.

B.

Implement different backups every Sunday at 8:00 and nightly incremental backups at 8:00 p.m

C.

Implement nightly full backups every Sunday at 8:00 p.m

D.

Implement full backups every Sunday at 8:00 p.m and nightly differential backups at 8:00

Full Access
Question # 20

A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?

A.

Configure the perimeter firewall to deny inbound external connections to SMB ports.

B.

Ensure endpoint detection and response systems are alerting on suspicious SMB connections.

C.

Deny unauthenticated users access to shared network folders.

D.

Verify computers are set to install monthly operating system, updates automatically.

Full Access
Question # 21

A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?

A.

SPIM

B.

Vishing

C.

Spear phishing

D.

Smishing

Full Access
Question # 22

A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue, the administrator logs in to the router, runs a command, and receives the following output:

Which of the following is the router experiencing?

A.

DDoS attack

B.

Memory leak

C.

Buffer overflow

D.

Resource exhaustion

Full Access
Question # 23

An organization has a growing workforce that is mostly driven by additions to the sales department. Each newly hired salesperson relies on a mobile device to conduct business. The Chief Information Officer (CIO) is wondering it the organization may need to scale down just as quickly as it scaled up. The ClO is also concerned about the organization's security and customer privacy. Which of the following would be BEST to address the ClO’s concerns?

A.

Disallow new hires from using mobile devices for six months

B.

Select four devices for the sales department to use in a CYOD model

C.

Implement BYOD for the sates department while leveraging the MDM

D.

Deploy mobile devices using the COPE methodology

Full Access
Question # 24

A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of the following attacks is MOST likely being detected?

A.

Pass-the-hash

B.

Buffer overflow

C.

Cross-site scripting

D.

Session replay

Full Access
Question # 25

An organization is concerned that is hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?

A.

Hping3 –s comptia, org –p 80

B.

Nc -1 –v comptia, org –p 80

C.

nmp comptia, org –p 80 –aV

D.

nslookup –port=80 comtia.org

Full Access