Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 2 of 107
QUESTION 1

- (Exam Topic 1)
Which of the following should be monitored by threat intelligence researchers who search for leaked credentials?

  1. A. Common Weakness Enumeration
  2. B. OSINT
  3. C. Dark web
  4. D. Vulnerability databases

Correct Answer: C

QUESTION 2

- (Exam Topic 5)
ir security team received a report of copyright infringement from the IP space of the corporate network. The report provided a precise time stamp for the incident as well as the name of the copyrighted file“sThe analyst has been tasked with determining the infringing source machine and instructed to implement measures to prevent such incidents from occurring again. Which of the following is MOST capable of accomplishing both tasks?

  1. A. HIDS
  2. B. Allow list
  3. C. TPM
  4. D. NGFW

Correct Answer: C

QUESTION 3

- (Exam Topic 5)
A secunity engineer needs to create a network segment that can be used for servers thal require connections from untrusted networks. Which of the following should the engineer implement?

  1. A. An air gap
  2. B. A hot site
  3. C. A VUAN
  4. D. A screened subnet

Correct Answer: D

QUESTION 4

- (Exam Topic 6)
Which of the following authentication methods is considered to be the LEAST secure?

  1. A. TOTP
  2. B. SMS
  3. C. HOTP
  4. D. Token key

Correct Answer: B

QUESTION 5

- (Exam Topic 4)
An analyst has determined that a server was not patched and an external actor exfiltrated data on port 139. Which of the following sources should the analyst review to BEST ascertain how the incident could have been prevented?

  1. A. The vulnerability scan output
  2. B. The security logs
  3. C. The baseline report
  4. D. The correlation of events

Correct Answer: A

Page 2 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: