CompTIA SECURITY+ SY0-601 EXAM 2023 Questions and
Answers (Verified Answers)
1. A security administrator suspects an employee has been emailing
propri- etary information to a competitor. Company policy requires the
administrator to capture an exact copy of the employee's hard disk.
Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger ANS : A
2. DRAG AND DROP SIMULATION (SEE IMAGE): THIS IS THE ORDER
AS FOLLOWS:
ssh-keygen -t rsa
ssh-copy-id -i ~/.ssh/id_rsa.pub
user@server chmod 644 ~/.ssh/id_rsa
ssh root@server
,3. DROP DOWN SIMULATION (SEE IMAGE) ANS : Firewall 1:DNS Rule
"" ANY --> ANY --> DNS --> PERMIT
HTTPS Outbound "" 10.0.0.1/24 --> ANY --> HTTPS -->
PERMIT Management "" ANY --> ANY --> SSH --> PERMIT
HTTPS Inbound "" ANY --> ANY --> HTTPS -->
PERMIT HTTP Inbound "" ANY --> ANY --> HTTP --
> DENY
Firewall 2: No changes should be made to this firewall
Firewall 3:DNS Rule "" ANY --> ANY --> DNS -->
PERMIT
HTTPS Outbound "" 192.168.0.1/24 --> ANY --> HTTPS -->
PERMIT Management "" ANY --> ANY --> SSH --> PERMIT
HTTPS Inbound "" ANY --> ANY --> HTTPS -->
PERMIT HTTP Inbound "" ANY --> ANY --> HTTP --
> DENY
4. DRAG AND DROP SIMULATION (SEE ANSWERS IN IMAGE): See
,5. Which of the following will MOST likely adversely impact the
operations of unpatched traditional programmable-logic controllers,
running a back-end LAMP server and OT systems with human-
management interfaces that are accessible over the Internet via a web
interface? (Choose two.)
A. Cross-site scripting
B. Data exfiltration
C. Poor system logging
D. Weak encryption
E. SQL injection
F. Server-side request forgery ANS : DF
6. A company recently transitioned to a strictly BYOD culture due to the
cost of replacing lost or damaged corporate-owned mobile devices.
Which of the following technologies would be BEST to balance the
BYOD culture while also protecting the company's data?
A. Containerization
B. Geofencing
C. Full-disk encryption
D. Remote wipe ANS : A
, 7. A Chief Security Office's (CSO's) key priorities are to improve
prepara- tion, response, and recovery practices to minimize system
downtime and enhance organizational resilience to ransomware attacks.
Which of the following would BEST meet the CSO's objectives?
A. Use email-filtering software and centralized account management,
patch high-risk systems, and restrict administration privileges on
fileshares.
B. Purchase cyber insurance from a reputable provider to reduce
expenses during an incident.
C. Invest in end-user awareness training to change the long-term culture
and behavior of staff and executives, reducing the organization's
susceptibility to phishing attacks.
Answers (Verified Answers)
1. A security administrator suspects an employee has been emailing
propri- etary information to a competitor. Company policy requires the
administrator to capture an exact copy of the employee's hard disk.
Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger ANS : A
2. DRAG AND DROP SIMULATION (SEE IMAGE): THIS IS THE ORDER
AS FOLLOWS:
ssh-keygen -t rsa
ssh-copy-id -i ~/.ssh/id_rsa.pub
user@server chmod 644 ~/.ssh/id_rsa
ssh root@server
,3. DROP DOWN SIMULATION (SEE IMAGE) ANS : Firewall 1:DNS Rule
"" ANY --> ANY --> DNS --> PERMIT
HTTPS Outbound "" 10.0.0.1/24 --> ANY --> HTTPS -->
PERMIT Management "" ANY --> ANY --> SSH --> PERMIT
HTTPS Inbound "" ANY --> ANY --> HTTPS -->
PERMIT HTTP Inbound "" ANY --> ANY --> HTTP --
> DENY
Firewall 2: No changes should be made to this firewall
Firewall 3:DNS Rule "" ANY --> ANY --> DNS -->
PERMIT
HTTPS Outbound "" 192.168.0.1/24 --> ANY --> HTTPS -->
PERMIT Management "" ANY --> ANY --> SSH --> PERMIT
HTTPS Inbound "" ANY --> ANY --> HTTPS -->
PERMIT HTTP Inbound "" ANY --> ANY --> HTTP --
> DENY
4. DRAG AND DROP SIMULATION (SEE ANSWERS IN IMAGE): See
,5. Which of the following will MOST likely adversely impact the
operations of unpatched traditional programmable-logic controllers,
running a back-end LAMP server and OT systems with human-
management interfaces that are accessible over the Internet via a web
interface? (Choose two.)
A. Cross-site scripting
B. Data exfiltration
C. Poor system logging
D. Weak encryption
E. SQL injection
F. Server-side request forgery ANS : DF
6. A company recently transitioned to a strictly BYOD culture due to the
cost of replacing lost or damaged corporate-owned mobile devices.
Which of the following technologies would be BEST to balance the
BYOD culture while also protecting the company's data?
A. Containerization
B. Geofencing
C. Full-disk encryption
D. Remote wipe ANS : A
, 7. A Chief Security Office's (CSO's) key priorities are to improve
prepara- tion, response, and recovery practices to minimize system
downtime and enhance organizational resilience to ransomware attacks.
Which of the following would BEST meet the CSO's objectives?
A. Use email-filtering software and centralized account management,
patch high-risk systems, and restrict administration privileges on
fileshares.
B. Purchase cyber insurance from a reputable provider to reduce
expenses during an incident.
C. Invest in end-user awareness training to change the long-term culture
and behavior of staff and executives, reducing the organization's
susceptibility to phishing attacks.