100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

SY0-601: COMPTIA SECURITY CERTIFICATION EXAM 2025 QUESTIONS AND ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
23
Cijfer
A+
Geüpload op
06-08-2025
Geschreven in
2025/2026

Which of the following is an important aspect of evidence-gathering? Back up all log files and audit trails. Purge transaction logs. Restore damaged data from backup media. Monitor user access to compromised systems. - ANS Back up all log files and audit trails. Which of the following items would be implemented at the Network layer of the security model? Wireless networks Network plans Firewalls using ACLs Penetration testing - ANS Penetration testing Prepare to Document means establishing the process you will use to document your network. Which of the following makes this documentation more useful? Identify the choke points on the network. Automate administration as much as possible. Identify who is responsible for each device. Have a printed hard copy kept in a secure location. - ANS Have a printed hard copy kept in a secure location. SY0-601: COMPTIA SECURITY CERTIFICATION EXAM 2025 QUESTIONS AND ANSWERS 2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with? Cross-training Job rotation Need to know Principle of least privilege - ANS Principle of least privilege A recreation of historical events is made possible through which of the following? Incident reports Audits Audit trails Penetration testing - ANS Audit trails An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. Which kind of exploit has been used in this scenario? Man-in-the-middle Reconnaissance DNS poisoning Domain name kiting - ANS DNS poisoning When you inform an employee that he or she is being terminated, which of the following is the most important activity? Disable his or her network access Allow him or her to collect their personal items Allow him or her to complete their current work projects Give him or her two weeks' notice - ANS Disable his or her network access Which protocol does HTTPS use to offer greater security in web transactions? 3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025 Kerberos IPsec SSL Telnet - ANS SSL How often should change-control management be implemented? Any time a production system is altered. At regular intervals throughout the year. Only when changes are made that affect senior management. Only when a production system is altered greatly. - ANS Any time a production system is altered. A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing? Non-repudiation Confidentiality Availability Integrity - ANS Confidentia

Meer zien Lees minder
Instelling
SY0-601
Vak
SY0-601










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
SY0-601
Vak
SY0-601

Documentinformatie

Geüpload op
6 augustus 2025
Aantal pagina's
23
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

SY0-601: COMPTIA SECURITY
CERTIFICATION EXAM 2025
QUESTIONS AND ANSWERS


Which of the following is an important aspect of evidence-gathering?
Back up all log files and audit trails.
Purge transaction logs.
Restore damaged data from backup media.

Monitor user access to compromised systems. - ANS Back up all log files and audit trails.


Which of the following items would be implemented at the Network layer of the security
model?
Wireless networks
Network plans
Firewalls using ACLs

Penetration testing - ANS Penetration testing


Prepare to Document means establishing the process you will use to document your network.
Which of the following makes this documentation more useful?
Identify the choke points on the network.
Automate administration as much as possible.
Identify who is responsible for each device.

Have a printed hard copy kept in a secure location. - ANS Have a printed hard copy kept in a
secure location.



1 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

,You assign access permissions so that users can only access the resources required to
accomplish their specific work tasks. Which security principle are you complying with?
Cross-training
Job rotation
Need to know

Principle of least privilege - ANS Principle of least privilege


A recreation of historical events is made possible through which of the following?
Incident reports
Audits
Audit trails

Penetration testing - ANS Audit trails


An attacker uses an exploit to push a modified hosts file to client systems. This hosts file
redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and
financial information.
Which kind of exploit has been used in this scenario?
Man-in-the-middle
Reconnaissance
DNS poisoning

Domain name kiting - ANS DNS poisoning


When you inform an employee that he or she is being terminated, which of the following is the
most important activity?
Disable his or her network access
Allow him or her to collect their personal items
Allow him or her to complete their current work projects

Give him or her two weeks' notice - ANS Disable his or her network access


Which protocol does HTTPS use to offer greater security in web transactions?

2 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

, Kerberos
IPsec
SSL

Telnet - ANS SSL


How often should change-control management be implemented?
Any time a production system is altered.
At regular intervals throughout the year.
Only when changes are made that affect senior management.

Only when a production system is altered greatly. - ANS Any time a production system is
altered.


A user copies files from her desktop computer to a USB flash device and puts the device into
her pocket. Which of the following security risks is most pressing?
Non-repudiation
Confidentiality
Availability

Integrity - ANS Confidentiality


Which ISO publication lays out guidelines for selecting and implementing security controls?
31000
27002
27701

27001 - ANS 27002


You are cleaning your desk at work. You toss several stacks of paper in the trash, including a
sticky note with your password written on it. Which of the following types of non-technical
password attacks have you enabled?
Social engineering
Dumpster diving

3 Copyright ©BRIGHSTARS ALL RIGHTS RESERVED 2025

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Brightstars Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
193
Lid sinds
1 jaar
Aantal volgers
7
Documenten
12191
Laatst verkocht
1 week geleden
VERIFIED EXAMS AND STUDY GUIDES.

Here, you will find Study Notes, Exam answer packs 100% Guarenteed success.

3,3

31 beoordelingen

5
10
4
4
3
8
2
3
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen