100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

SY0-601: COMPTIA SECURITY CERTIFICATION EXAM 2025 QUESTIONS AND ANSWERS

Puntuación
-
Vendido
-
Páginas
23
Grado
A+
Subido en
06-08-2025
Escrito en
2025/2026

Which of the following is an important aspect of evidence-gathering? Back up all log files and audit trails. Purge transaction logs. Restore damaged data from backup media. Monitor user access to compromised systems. - ANS Back up all log files and audit trails. Which of the following items would be implemented at the Network layer of the security model? Wireless networks Network plans Firewalls using ACLs Penetration testing - ANS Penetration testing Prepare to Document means establishing the process you will use to document your network. Which of the following makes this documentation more useful? Identify the choke points on the network. Automate administration as much as possible. Identify who is responsible for each device. Have a printed hard copy kept in a secure location. - ANS Have a printed hard copy kept in a secure location. SY0-601: COMPTIA SECURITY CERTIFICATION EXAM 2025 QUESTIONS AND ANSWERS 2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with? Cross-training Job rotation Need to know Principle of least privilege - ANS Principle of least privilege A recreation of historical events is made possible through which of the following? Incident reports Audits Audit trails Penetration testing - ANS Audit trails An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. Which kind of exploit has been used in this scenario? Man-in-the-middle Reconnaissance DNS poisoning Domain name kiting - ANS DNS poisoning When you inform an employee that he or she is being terminated, which of the following is the most important activity? Disable his or her network access Allow him or her to collect their personal items Allow him or her to complete their current work projects Give him or her two weeks' notice - ANS Disable his or her network access Which protocol does HTTPS use to offer greater security in web transactions? 3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 Kerberos IPsec SSL Telnet - ANS SSL How often should change-control management be implemented? Any time a production system is altered. At regular intervals throughout the year. Only when changes are made that affect senior management. Only when a production system is altered greatly. - ANS Any time a production system is altered. A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing? Non-repudiation Confidentiality Availability Integrity - ANS Confidentia

Mostrar más Leer menos
Institución
SY0-601
Grado
SY0-601










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
SY0-601
Grado
SY0-601

Información del documento

Subido en
6 de agosto de 2025
Número de páginas
23
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

SY0-601: COMPTIA SECURITY
CERTIFICATION EXAM 2025
QUESTIONS AND ANSWERS


Which of the following is an important aspect of evidence-gathering?
Back up all log files and audit trails.
Purge transaction logs.
Restore damaged data from backup media.

Monitor user access to compromised systems. - ANS Back up all log files and audit trails.


Which of the following items would be implemented at the Network layer of the security
model?
Wireless networks
Network plans
Firewalls using ACLs

Penetration testing - ANS Penetration testing


Prepare to Document means establishing the process you will use to document your network.
Which of the following makes this documentation more useful?
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.

Have a printed hard copy kept in a secure location. - ANS Have a printed hard copy kept in a
secure location.



1 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

,You assign access permissions so that users can only access the resources required to
accomplish their specific work tasks. Which security principle are you complying with?
Cross-training
Job rotation
Need to know

Principle of least privilege - ANS Principle of least privilege


A recreation of historical events is made possible through which of the following?
Incident reports
Audits
Audit trails

Penetration testing - ANS Audit trails


An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.
Which kind of exploit has been used in this scenario?
Man-in-the-middle
Reconnaissance
DNS poisoning

Domain name kiting - ANS DNS poisoning


When you inform an employee that he or she is being terminated, which of the following is the
most important activity?
Disable his or her network access
Allow him or her to collect their personal items
Allow him or her to complete their current work projects

Give him or her two weeks' notice - ANS Disable his or her network access


Which protocol does HTTPS use to offer greater security in web transactions?

2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

, Kerberos
IPsec
SSL

Telnet - ANS SSL


How often should change-control management be implemented?
Any time a production system is altered.
At regular intervals throughout the year.
Only when changes are made that affect senior management.

Only when a production system is altered greatly. - ANS Any time a production system is
altered.


A user copies files from her desktop computer to a USB flash device and puts the device into
her pocket. Which of the following security risks is most pressing?
Non-repudiation
Confidentiality
Availability

Integrity - ANS Confidentiality


Which ISO publication lays out guidelines for selecting and implementing security controls?
31000
27002
27701

27001 - ANS 27002


You are cleaning your desk at work. You toss several stacks of paper in the trash, including a
sticky note with your password written on it. Which of the following types of non-technical
password attacks have you enabled?
Social engineering
Dumpster diving

3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Brightstars Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
193
Miembro desde
1 año
Número de seguidores
7
Documentos
12191
Última venta
1 semana hace
VERIFIED EXAMS AND STUDY GUIDES.

Here, you will find Study Notes, Exam answer packs 100% Guarenteed success.

3.3

31 reseñas

5
10
4
4
3
8
2
3
1
6

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes