Download CompTIA Security+ Certification Exam.Marks4Sure.SY0-601.2021-04-30.1e.197q.vcex

Download Exam

File Info

Exam CompTIA Security+ Certification Exam
Number SY0-601
File Name CompTIA Security+ Certification Exam.Marks4Sure.SY0-601.2021-04-30.1e.197q.vcex
Size 4.48 Mb
Posted April 30, 2021

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Which of the following BEST describes a security exploit for which a vendor patch is not readily available?

  • A: Integer overflow
  • B: Zero-day
  • C: End of life
  • D: Race condition

Question 2
A remote user recently took a two-week vacation abroad and brought along a corporate-owned laptop. Upon returning to work, the user has been unable to connect the laptop to the VPN. Which of the following is the MOST likely reason for the user’s inability to connect the laptop to the VPN?

  • A: Due to foreign travel, the user’s laptop was isolated from the network.
  • B: The user’s laptop was quarantined because it missed the latest path update.
  • C: The VPN client was blacklisted.
  • D: The user’s account was put on a legal hold. 

Question 3
A user recent an SMS on a mobile phone that asked for bank delays. Which of the following social-engineering techniques was used in this case?

  • A: SPIM
  • B: Vishing
  • C: Spear phishing
  • D: Smishing

Question 4
An attacker is exploiting a vulnerability that does not have a patch available. Which of the following is the attacker exploiting?

  • A: Zero-day 
  • B: Default permissions
  • C: Weak encryption
  • D: Unsecure root accounts

Question 5
A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. 
Which of the following would BEST detect the presence of a rootkit in the future?

  • A: FDE
  • B: NIDS
  • C: EDR
  • D: DLP

Question 6
A security analyst receives the configuration of a current VPN profile and notices the authentication is only applied to the IP datagram portion of the packet. 
Which of the following should the analyst implement to authenticate the entire packet?

  • A: AH
  • B: ESP
  • C: SRTP
  • D: LDAP

Question 7
A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. 
Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)

  • A: Trusted Platform Module  
  • B: A host-based firewall
  • C: A DLP solution
  • D: Full disk encryption
  • E: A VPN
  • F: Antivirus software

Question 8
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. 
Which of the following technologies are being utilized to provide these capabilities? (Select TWO)

  • A: COPE
  • B: VDI
  • C: GPS
  • D: TOTP
  • E: RFID
  • F: BYOD

Question 9
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, incident during a pandemic or crisis, However, the CEO is concerned that some staff members may take advantage of the of the flexibility and work from high-risk countries while on holidays work to a third-party organization in another country. The Chief information Officer (CIO) believes the company can implement some basic to mitigate the majority of the risk. 
Which of the following would be BEST to mitigate CEO’s concern? (Select TWO).

  • A: Geolocation
  • B: Time-of-day restrictions
  • C: Certificates
  • D: Tokens
  • E: Geotagging
  • F: Role-based access controls

Question 10
Which of the following will MOST likely adversely impact the operations of unpatched traditional programmable-logic controllers, running a back-end LAMP server and OT systems with human-management interfaces that are accessible over the Internet via a web interface? (Choose two.)

  • A: Cross-site scripting
  • B: Data exfiltration  
  • C: Poor system logging
  • D: Weak encryption
  • E: SQL injection
  • F: Server-side request forgery


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files