Download CompTIA Security+ Certification Exam.VCEplus.SY0-601.2020-11-24.1e.82q.vcex

Download Exam

File Info

Exam CompTIA Security+ Certification Exam
Number SY0-601
File Name CompTIA Security+ Certification Exam.VCEplus.SY0-601.2020-11-24.1e.82q.vcex
Size 2.55 Mb
Posted November 24, 2020
Downloads 64

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.
Click on each firewall to do the following:
Deny cleartext web traffic.
Ensure secure management protocols are used.
Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  • A: See explanation below.

Question 2
A security engineer is setting up passwordless authentication for the first time.
Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  • A:

Question 3
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

  • A:

Question 4
Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)

  • A: Cross-site scripting
  • B: Data exfiltration
  • C: Poor system logging
  • D: Weak encryption
  • E: SQL injection
  • F: Server-side request forgery

Question 5
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company's data?

  • A: Containerization
  • B: Geofencing
  • C: Full-disk encryption
  • D: Remote wipe

Question 6
A Chief Security Office's (CSO's) key priorities are to improve preparation, response, and recovery practices to minimize system downtime and enhance organizational resilience to ransomware attacks. Which of the following would BEST meet the CSO's objectives?

  • A: Use email-filtering software and centralized account management, patch high-risk systems, and restrict administration privileges on fileshares.
  • B: Purchase cyber insurance from a reputable provider to reduce expenses during an incident.
  • C: Invest in end-user awareness training to change the long-term culture and behavior of staff and executives, reducing the organization's susceptibility to phishing attacks.
  • D: Implement application whitelisting and centralized event-log management, and perform regular testing and validation of full backups.

Question 7
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should the engineer do to determine the issue? (Choose two.) 

  • A: Perform a site survey
  • B: Deploy an FTK Imager
  • C: Create a heat map
  • D: Scan for rogue access points
  • E: Upgrade the security protocols
  • F: Install a captive portal

Question 8
A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk. Which of the following should the administrator use?

  • A: dd
  • B: chmod
  • C: dnsenum
  • D: logger

Question 9
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?

  • A: SSAE SOC 2
  • B: PCI DSS
  • C: GDPR
  • D: ISO 31000

Question 10
Phishing and spear-phishing attacks have been occurring more frequently against a company's staff. Which of the following would MOST likely help mitigate this issue?

  • B: DNS query logging
  • C: Exact mail exchanger records in the DNS
  • D: The addition of DNS conditional forwarders



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files