Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SY0-601 COMPTIA SECURITY CERTIFICATION EXAM QUESTIONS WITH ACCURATE ANSWERS

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
23-01-2026
Written in
2025/2026

SY0-601 COMPTIA SECURITY CERTIFICATION EXAM QUESTIONS WITH ACCURATE ANSWERS

Institution
Course

Content preview

SY0-601
COMPTIA SECURITY CERTIFICATION EXAM
QUESTIONS WITH ACCURATE ANSWERS

Which of the following is an important aspect of evidence-gathering?

Back up all log files and audit trails.

Purge transaction logs.
Restore damaged data from backup media.

Monitor user access to compromised systems. - ANSWER-Back up all log files and audit trails.

Which of the following items would be implemented at the Network layer of the security model?

Wireless networks

Network plans

Firewalls using ACLs

Penetration testing - ANSWER-Penetration testing
Prepare to Document means establishing the process you will use to document your network.

Which of the following makes this documentation more useful?

Identify the choke points on the network.

Automate administration as much as possible.

Identify who is responsible for each device.

Have a printed hard copy kept in a secure location. - ANSWER-Have a printed hard copy kept in
a secure location.

You assign access permissions so that users can only access the resources required to accomplish
their specific work tasks. Which security principle are you complying with?

Cross-training

Job rotation

Need to know
Principle of least privilege - ANSWER-Principle of least privilege
A recreation of historical events is made possible through which of the following?

,Incident reports

Audits

Audit trails

Penetration testing - ANSWER-Audit trails
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.

Which kind of exploit has been used in this scenario?

Man-in-the-middle
Reconnaissance

DNS poisoning

Domain name kiting - ANSWER-DNS poisoning

When you inform an employee that he or she is being terminated, which of the following is the
most important activity?

Disable his or her network access

Allow him or her to collect their personal items

Allow him or her to complete their current work projects

Give him or her two weeks' notice - ANSWER-Disable his or her network access

Which protocol does HTTPS use to offer greater security in web transactions?
Kerberos

IPsec

SSL

Telnet - ANSWER-SSL

How often should change-control management be implemented?

Any time a production system is altered.

At regular intervals throughout the year.
Only when changes are made that affect senior management.

, Only when a production system is altered greatly. - ANSWER-Any time a production system is
altered.

A user copies files from her desktop computer to a USB flash device and puts the device into her
pocket. Which of the following security risks is most pressing?

Non-repudiation

Confidentiality

Availability

Integrity - ANSWER-Confidentiality

Which ISO publication lays out guidelines for selecting and implementing security controls?
31000

27002

27701

27001 - ANSWER-27002

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a
sticky note with your password written on it. Which of the following types of non-technical
password attacks have you enabled?

Social engineering

Dumpster diving

Shoulder surfing

Password guessing - ANSWER-Dumpster diving

Which of the following functions does a single quote (') perform in an SQL injection?
Indicates that everything after the single quote is a comment

Indicates that the comment has ended and data is being entered

Indicates that code is ending and a comment is being entered

Indicates that data has ended and a command is beginning - ANSWER-Indicates that data has
ended and a command is beginning

You have detected and identified a security event. What's the first step you should complete?

Isolation
Segmentation

Written for

Course

Document information

Uploaded on
January 23, 2026
Number of pages
21
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$30.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
donmartincruz

Get to know the seller

Seller avatar
donmartincruz Mc arthy
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
9 months
Number of followers
0
Documents
152
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions