CompTIA SECURITY+ SY0-601 EXAM Questions and Answers(Verified)

1

1 / 53

CompTIA SECURITY+ SY0-601 EXAM 2023 - 2024

Questions and Answers(Verified)

1. A security administrator suspects an employee has been emailing propri- etary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk.

Which of the following should the administrator use?

A. dd

B. chmod

C. dnsenum

D. logger ANS : A

2. DRAG AND DROP SIMULATION (SEE IMAGE): THIS IS THE ORDER

AS FOLLOWS:

ssh-keygen -t rsa

ssh-copy-id -i ~/.ssh/id_rsa.pub

user@server chmod 644 ~/.ssh/id_rsa

ssh root@server


2

2 / 53

3. DROP DOWN SIMULATION (SEE IMAGE) ANS : Firewall 1:DNS Rule ""

ANY --> ANY --> DNS --> PERMIT

HTTPS Outbound "" 10.0.0.1/24 --> ANY --> HTTPS --> PERMIT

Management "" ANY --> ANY --> SSH --> PERMIT

HTTPS Inbound "" ANY --> ANY --> HTTPS --> PERMIT

HTTP Inbound "" ANY --> ANY --> HTTP --> DENY

Firewall 2: No changes should be made to this firewall

Firewall 3:DNS Rule "" ANY --> ANY --> DNS --> PERMIT

HTTPS Outbound "" 192.168.0.1/24 --> ANY --> HTTPS --> PERMIT

Management "" ANY --> ANY --> SSH --> PERMIT

HTTPS Inbound "" ANY --> ANY --> HTTPS --> PERMIT

HTTP Inbound "" ANY --> ANY --> HTTP --> DENY

4. DRAG AND DROP SIMULATION (SEE ANSWERS IN IMAGE): See


3

5. Which of the following will MOST likely adversely impact the operations

of unpatched traditional programmable-logic controllers, running a backend LAMP server and OT systems with human-management interfaces that

are accessible over the Internet via a web interface? (Choose two.)

A. Cross-site scripting

B. Data exfiltration

C. Poor system logging

D.Weak encryption

E. SQL injection

F. Server-side request forgery ANS : DF

6. A company recently transitioned to a strictly BYOD culture due to the

cost of replacing lost or damaged corporate-owned mobile devices.

Which of the following technologies would be BEST to balance the

BYOD culture while also protecting the company's data?

A. Containerization

B. Geofencing

C. Full-disk encryption

D. Remote wipe ANS : A


4

7. A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime

and enhance organizational resilience to ransomware attacks.

Which of the following would BEST meet the CSO's objectives?

A. Use email-filtering software and centralized account management,

patch high-risk systems, and restrict administration privileges on

fileshares.

B. Purchase cyber insurance from a reputable provider to reduce

expenses during an incident.

C. Invest in end-user awareness training to change the long-term culture

and behavior of staff and executives, reducing the organization's

susceptibility to phishing attacks.

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $21.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing