CompTIA SY0-601 Practice Test
Prepare smarter and boost your chances of success with our CompTIA SY0-601 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use SY0-601 practice exam are 40–50% more likely to pass on their first attempt.
Start practicing today and take the fast track to becoming CompTIA SY0-601 certified.
18860 already prepared
Updated On : 13-Aug-2025886 Questions
4.8/5.0
Topic 3: Exam Pool C
The security administrator has installed a new firewall which implements an implicit DENY
policy by default.
INSTRUCTIONS:
Click on the firewall and configure it to allow ONLY the following communication.
1. The Accounting workstation can ONLY access the web server on the public network
over the default HTTPS port. The accounting workstation should not access other
networks.
2. The HR workstation should be restricted to communicate with the Financial server
ONLY, over the default SCP port
3. The Admin workstation should ONLY be able to access the servers on the secure
network over the default TFTP port.
Instructions: The firewall will process the rules in a top-down manner in order as a first
match The port number must be typed in and only one port number can be entered per rule
Type ANY for all ports. The original firewall configuration can be reset at any time by
pressing the reset button. Once you have met the simulation requirements, click save and
then Done to submit.
The cost of '©movable media and the security risks of transporting data have become too
great for a laboratory. The laboratory has decided to interconnect with partner laboratones
to make data transfers easier and more secure. The Chief Security Officer <CSO) has
several concerns about proprietary data being exposed once the interconnections are
established. Which of the following security features should the network administrator
implement lo prevent unwanted data exposure to users in partner laboratories?
A.
VLAN zoning with a file-transfer server in an external-facing zone
B.
DLP running on hosts to prevent file transfers between networks
C.
NAC that permits only data-transfer agents to move data between networks
D.
VPN with full tunneling and NAS authenticating through the Active Directory
DLP running on hosts to prevent file transfers between networks
Remote workers in an organization use company-provided laptops with locally installed
applications and locally stored data Users can store data on a remote server using an
encrypted connection. The organization discovered data stored on a laptop had been made
available to the public Which of the following security solutions would mitigate the risk of
future data disclosures?
A.
FDE
B.
TPM
C.
HIDS
D.
VPN
FDE
Which of the following environments utilizes dummy data and is MOST likely to be installed
locally on a system that allows code to be assessed directly and modified easily with each
build?
A.
Production
B.
Test
C.
Staging
D.
Development
Test
An organization relies on third-party video conferencing to conduct daily business. Recent
security changes now require all remote workers to utilize a VPN to corporate resources.
Which of the following would BEST maintain
high-quality video conferencing while minimizing latency when connected to the VPN?
A.
Using geographic diversity to have VPN terminators closer to end users
B.
Utilizing split tunneling so only traffic for corporate resources is encrypted
C.
Purchasing higher-bandwidth connections to meet the increased demand
D.
Configuring QoS properly on the VPN accelerators
Configuring QoS properly on the VPN accelerators
Which of the following is a difference between a DRP and a BCP?
A.
A BCP keeps operations running during a disaster while a DRP does not.
B.
A BCP prepares for any operational interruption while a DRP prepares for natural
disasters
C.
A BCP is a technical response to disasters while a DRP is operational.
D.
A BCP Is formally written and approved while a DRP is not.
A BCP is a technical response to disasters while a DRP is operational.
A systems administrator is looking for a solution that will help prevent OAuth applications
from being leveraged by hackers to trick users into authorizing the use of their corporate
credentials. Which of the following BEST describes this solution?
A.
CASB
B.
UEM
C.
WAF
D.
VPC
WAF
Which of the following BEST describes a social-engineering attack that relies on an executive at a small business visiting a fake banking website where credit card and account details are harvested?
A.
Whaling
B.
Spam
C.
Invoice scam
D.
Pharming
Pharming
Explanation: Pharming: Phishing attempt to trick a user to access a different or fake website (usually by modifying hosts file)
Which of the following environments would MOST likely be used to assess the execution of
component parts of a system at both the hardware and software levels and to measure
performance characteristics?
A.
Test
B.
Staging
C.
Development
D.
Production
Test
Which of the following function as preventive, detective, and deterrent controls to reduce
the risk of physical theft? (Select TWO).
A.
Mantraps
B.
Security guards
C.
Video surveillance
D.
Fences
E.
Bollards
F.
Antivirus
Mantraps
B.
Security guards
Page 28 out of 89 Pages |
SY0-601 Practice Test | Previous |