Leads4pass > CompTIA > CompTIA Certifications > SY0-601 > SY0-601 Online Practice Questions and Answers

SY0-601 Online Practice Questions and Answers

Questions 4

Which of the following would cause a Chief Information Security Officer (CISO) the MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?

A. An inability to monitor 100% of every facility could expose the company to unnecessary risk.

B. The cameras could be compromised if not patched in a timely manner.

C. Physical security at the facility may not protect the cameras from theft.

D. Exported videos may take up excessive space on the file servers.

Buy Now
Questions 5

To secure an application after a large data breach, an e-commerce site will be resetting all users' credentials. Which of the following will BEST ensure the site's users are not compromised after the reset?

A. A password reuse policy

B. Account lockout after three failed attempts

C. Encrypted credentials in transit

D. A geofencing policy based on login history

Buy Now
Questions 6

A company's Chief Information Security Officer (CISO) recently warned the security manager that the company's Chief Executive Officer (CEO) is planning to publish a controversial option article in a national newspaper, which may result in new cyberattacks Which of the following would be BEST for the security manager to use in a threat mode?

A. Hacktivists

B. White-hat hackers

C. Script kiddies

D. Insider threats

Buy Now
Questions 7

A security analyst in a SOC has been tasked with onboarding a new network into the SIEM. Which of the following BEST describes the information that should feed into a SIEM solution in order to adequately support an investigation?

A. Logs from each device type and security layer to provide correlation of events

B. Only firewall logs since that is where attackers will most likely try to breach the network

C. Email and web-browsing logs because user behavior is often the cause of security breaches

D. NetFlow because it is much more reliable to analyze than syslog and will be exportable from every device

Buy Now
Questions 8

Which of the following types of controls is a CCTV camera that is not being monitored?

A. Detective

B. Deterrent

C. Physical

D. Preventive

Buy Now
Questions 9

An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?

A. Provide a domain parameter to theHarvester tool.

B. Check public DNS entries using dnsenum.

C. Perform a Nessus vulnerability scan targeting a public company's IP.

D. Execute nmap using the options: scan all ports and sneaky mode.

Buy Now
Questions 10

An analyst is concerned about data leaks and wants to restrict access to internet services to authorized users only. The analyst also wants to control the actions each user can perform on each service. Which of the following would be the best technology for the analyst to consider Implementing?

A. DLP

B. VPC

C. CASB

D. Content filtering

Buy Now
Questions 11

Which of the following should be addressed first on security devices before connecting to the network?

A. Open permissions

B. Default settings

C. API integration configuration

D. Weak encryption

Buy Now
Questions 12

In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following BEST describes the security engineer's response?

A. Risk tolerance

B. Risk acceptance

C. Risk importance

D. Risk appetite

Buy Now
Questions 13

A software company has a shared codebase for multiple projects using the following strategy:

1.

Unused features are deactivated but still present on the code.

2.

New customer requirements trigger additional development work.

Which of the following will most likely occur when the company uses this strategy?

A. Malicious code

B. Dead code

C. Outsourced code

D. Code obfuscation

Buy Now
Exam Code: SY0-601
Exam Name: CompTIA Security+
Last Update: Jan 16, 2025
Questions: 1334
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99