CompTIA SY0-601 Practice Test
Prepare smarter and boost your chances of success with our CompTIA SY0-601 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use SY0-601 practice exam are 40–50% more likely to pass on their first attempt.
Start practicing today and take the fast track to becoming CompTIA SY0-601 certified.
18860 already prepared
Updated On : 13-Aug-2025886 Questions
4.8/5.0
Topic 3: Exam Pool C
Which of the following algorithms has the SMALLEST key size?
A.
DES
B.
Twofish
C.
RSA
D.
AES
Twofish
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)
A.
COPE
B.
VDI
C.
GPS
D.
TOTP
E.
RFID
F.
BYOD
VDI
E.
RFID
Which of the following types of controls is a turnstile?
A.
Physical
B.
Detective
C.
Corrective
D.
Technical
Physical
An organization is concerned that is hosted web servers are not running the most updated version of the software. Which of the following would work BEST to help identify potential vulnerabilities?
A.
Hping3 –s comptia, org –p 80
B.
Nc -1 –v comptia, org –p 80
C.
nmp comptia, org –p 80 –aV
D.
nslookup –port=80 comtia.org
nmp comptia, org –p 80 –aV
Explanation: Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.
An organization suffered an outage and a critical system took 90 minutes to come back online. Though there was no data loss during the outage, the expectation was that the critical system would be available again within 60 minutes Which of the following is the 60- minute expectation an example of:
A.
MTBF
B.
RPO
C.
MTTR
D.
DRTO
DRTO
A network engineer is troubleshooting wireless network connectivity issues that were
reported by users. The issues are occurring only in the section of the building that is closest
to the parking lot. Users are intermittently experiencing slow speeds when accessing
websites and are unable to connect to network drives. The issues appear to increase when
laptop users return desks after using their devices in other areas of the building. There
have also been reports of users being required to enter their credentials on web pages in
order to gain access to them. Which of the following is the MOST likely cause of this issue?
A.
An external access point is engaging in an evil-twin attack.
B.
The signal on the WAP needs to be increased in that section of the building.
C.
The certificates have expired on the devices and need to be reinstalled.
D.
The users in that section of the building are on a VLAN that is being blocked by the firewall.
An external access point is engaging in an evil-twin attack.
A security manager for a retailer needs to reduce the scope of a project to comply with PCI
DSS. The PCI data is located in different offices than where credit cards are accepted. All
the offices are connected via MPLS back to the primary datacenter. Which of the following
should the security manager implement to achieve the objective?
A.
Segmentation
B.
Containment
C.
Geofencing
D.
Isolation
Segmentation
A company wants to deploy PKI on its Internet-facing website. The applications that are currently deployed are:
www.company.com (main website)
contactus.company.com (for locating a nearby location)
quotes.company.com (for requesting a price quote)
The company wants to purchase one SSL certificate that will work for all the existing
applications and any future applications that follow the same naming conventions, such as
store.company.com. Which of the following certificate types would BEST meet the
requirements?
A.
SAN
B.
Wildcard
C.
Extended validation
D.
Self-signed
Wildcard
A security analyst needs to complete an assessment. The analyst is logged into a server
and must use native tools to map services running on it to the server's listening ports.
Which of the following tools can BEST accomplish this talk?
A.
Netcat
B.
Netstat
C.
Nmap
D.
Nessus
Netstat
The following is an administrative control that would be MOST effective to reduce the
occurrence of malware execution?
A.
Security awareness training
B.
Frequency of NIDS updates
C.
Change control procedures
D.
EDR reporting cycle
Security awareness training
Page 8 out of 89 Pages |
SY0-601 Practice Test | Previous |