100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SY0-601: COMPTIA SECURITY CERTIFICATION EXAM 2025 QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
06-08-2025
Written in
2025/2026

Which of the following is an important aspect of evidence-gathering? Back up all log files and audit trails. Purge transaction logs. Restore damaged data from backup media. Monitor user access to compromised systems. - ANS Back up all log files and audit trails. Which of the following items would be implemented at the Network layer of the security model? Wireless networks Network plans Firewalls using ACLs Penetration testing - ANS Penetration testing Prepare to Document means establishing the process you will use to document your network. Which of the following makes this documentation more useful? Identify the choke points on the network. Automate administration as much as possible. Identify who is responsible for each device. Have a printed hard copy kept in a secure location. - ANS Have a printed hard copy kept in a secure location. SY0-601: COMPTIA SECURITY CERTIFICATION EXAM 2025 QUESTIONS AND ANSWERS 2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with? Cross-training Job rotation Need to know Principle of least privilege - ANS Principle of least privilege A recreation of historical events is made possible through which of the following? Incident reports Audits Audit trails Penetration testing - ANS Audit trails An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. Which kind of exploit has been used in this scenario? Man-in-the-middle Reconnaissance DNS poisoning Domain name kiting - ANS DNS poisoning When you inform an employee that he or she is being terminated, which of the following is the most important activity? Disable his or her network access Allow him or her to collect their personal items Allow him or her to complete their current work projects Give him or her two weeks' notice - ANS Disable his or her network access Which protocol does HTTPS use to offer greater security in web transactions? 3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 Kerberos IPsec SSL Telnet - ANS SSL How often should change-control management be implemented? Any time a production system is altered. At regular intervals throughout the year. Only when changes are made that affect senior management. Only when a production system is altered greatly. - ANS Any time a production system is altered. A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing? Non-repudiation Confidentiality Availability Integrity - ANS Confidentia

Show more Read less
Institution
SY0-601
Course
SY0-601










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
SY0-601
Course
SY0-601

Document information

Uploaded on
August 6, 2025
Number of pages
23
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SY0-601: COMPTIA SECURITY
CERTIFICATION EXAM 2025
QUESTIONS AND ANSWERS


Which of the following is an important aspect of evidence-gathering?
Back up all log files and audit trails.
Purge transaction logs.
Restore damaged data from backup media.

Monitor user access to compromised systems. - ANS Back up all log files and audit trails.


Which of the following items would be implemented at the Network layer of the security
model?
Wireless networks
Network plans
Firewalls using ACLs

Penetration testing - ANS Penetration testing


Prepare to Document means establishing the process you will use to document your network.
Which of the following makes this documentation more useful?
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.

Have a printed hard copy kept in a secure location. - ANS Have a printed hard copy kept in a
secure location.



1 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

,You assign access permissions so that users can only access the resources required to
accomplish their specific work tasks. Which security principle are you complying with?
Cross-training
Job rotation
Need to know

Principle of least privilege - ANS Principle of least privilege


A recreation of historical events is made possible through which of the following?
Incident reports
Audits
Audit trails

Penetration testing - ANS Audit trails


An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.
Which kind of exploit has been used in this scenario?
Man-in-the-middle
Reconnaissance
DNS poisoning

Domain name kiting - ANS DNS poisoning


When you inform an employee that he or she is being terminated, which of the following is the
most important activity?
Disable his or her network access
Allow him or her to collect their personal items
Allow him or her to complete their current work projects

Give him or her two weeks' notice - ANS Disable his or her network access


Which protocol does HTTPS use to offer greater security in web transactions?

2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

, Kerberos
IPsec
SSL

Telnet - ANS SSL


How often should change-control management be implemented?
Any time a production system is altered.
At regular intervals throughout the year.
Only when changes are made that affect senior management.

Only when a production system is altered greatly. - ANS Any time a production system is
altered.


A user copies files from her desktop computer to a USB flash device and puts the device into
her pocket. Which of the following security risks is most pressing?
Non-repudiation
Confidentiality
Availability

Integrity - ANS Confidentiality


Which ISO publication lays out guidelines for selecting and implementing security controls?
31000
27002
27701

27001 - ANS 27002


You are cleaning your desk at work. You toss several stacks of paper in the trash, including a
sticky note with your password written on it. Which of the following types of non-technical
password attacks have you enabled?
Social engineering
Dumpster diving

3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brightstars Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
193
Member since
1 year
Number of followers
7
Documents
12191
Last sold
1 week ago
VERIFIED EXAMS AND STUDY GUIDES.

Here, you will find Study Notes, Exam answer packs 100% Guarenteed success.

3.3

31 reviews

5
10
4
4
3
8
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions