CompTIA SY0-601 Practice Test

Prepare smarter and boost your chances of success with our CompTIA SY0-601 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use SY0-601 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA SY0-601 certified.

18860 already prepared
Updated On : 13-Aug-2025
886 Questions
4.8/5.0

Page 20 out of 89 Pages

Topic 3: Exam Pool C

An organization is developing a plan in the event of a complete loss of critical systems and data. Which of the following plans is the organization MOST likely developing?

A.

Incident response

B.

Communications

C.

Disaster recovery

D.

Data retention

C.   

Disaster recovery



A company is launching a new internet platform for its clients. The company does not want
to implement its own authorization solution but instead wants to rely on the authorization
provided by another platform. Which of the following is the BEST approach to implement
the desired solution?

A.

OAuth

B.

TACACS+

C.

SAML

D.

RADIUS

D.   

RADIUS



The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?

A.

Limit the use of third-party libraries.

B.

Prevent data exposure queries.

C.

Obfuscate the source code.

D.

Submit the application to QA before releasing it.

D.   

Submit the application to QA before releasing it.



To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?

A.

A password reuse policy

B.

Account lockout after three failed attempts

C.

Encrypted credentials in transit

D.

A geofencing policy based on login history

C.   

Encrypted credentials in transit



A security analyst is using a recently released security advisory to review historical logs, looking for the specific activity that was outlined in the advisory. Which of the following is the analyst doing?

A.

A packet capture

B.

A user behavior analysis

C.

Threat hunting

D.

Credentialed vulnerability scanning

C.   

Threat hunting



A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?

A.

Predictability

B.

Key stretching

C.

Salting

D.

Hashing

C.   

Salting



An organization hired a consultant to assist with an active attack, and the consultant was
able to identify the compromised accounts and computers. Which of the following is the
consultant MOST likely to recommend to prepare for eradication?

A.

Quarantining the compromised accounts and computers, only providing them with
network access

B.

Segmenting the compromised accounts and computers into a honeynet so as to not
alert the attackers.

C.

Isolating the compromised accounts and computers, cutting off all network and internet
access.

D.

Logging off and deleting the compromised accounts and computers to eliminate attacker
access.

B.   

Segmenting the compromised accounts and computers into a honeynet so as to not
alert the attackers.



An attacker is attempting to exploit users by creating a fake website with the URL users.
Which of the following social-engineering attacks does this describe?

A.

Information elicitation

B.

Typo squatting

C.

Impersonation

D.

Watering-hole attack

D.   

Watering-hole attack



Which of the following policies would help an organization identify and mitigate potential single points of failure in the company’s IT/security operations?

A.

Least privilege

B.

Awareness training

C.

Separation of duties

D.

Mandatory vacation

C.   

Separation of duties



Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the read data?

A.

Data encryption

B.

Data masking

C.

Data deduplication

D.

Data minimization

B.   

Data masking



Page 20 out of 89 Pages
SY0-601 Practice Test Previous