2024-2025 CompTIA SECURITY+ SY0-601 BEST EXAM STUDY
by Brian MacFarlane Exam New Update
A
A security administrator suspects an employee has been emailing proprietary information
to a competitor. Company policy requires the administrator to capture an exact copy of
the employee's hard disk.
Which of the following should the administrator use?
A. dd
B. chmod
C. dnsenum
D. logger
THIS IS THE ORDER AS FOLLOWS:
ssh-keygen -t rsa
ssh-copy-id -i ~/.ssh/id_rsa.pub user@server
chmod 644 ~/.ssh/id_rsa
ssh root@server
DRAG AND DROP SIMULATION (SEE IMAGE)
Firewall 1: DNS Rule "" ANY --> ANY --> DNS --> PERMIT HTTPS Outbound "" 10.0.0.1/24
--> ANY --> HTTPS --> PERMIT Management "" ANY --> ANY --> SSH --> PERMIT HTTPS
Inbound "" ANY --> ANY --> HTTPS --> PERMIT HTTP Inbound "" ANY --> ANY --> HTTP -->
DENY Firewall 2: No changes are to be performed on this firewall. Firewall 3: DNS Rule ""
ANY --> ANY --> DNS --> PERMIT
HTTPS Outbound " " 192.168.0.1/24 --> ANY --> HTTPS --> PERMIT Management " " ANY
--> ANY --> SSH --> PERMIT HTTPS Inbound " " ANY --> ANY --> HTTPS --> PERMIT HTTP
Inbound " " ANY --> ANY --> HTTP --> DENY DROP DOWN SIMULATION See IMAGE DRAG
AND DROP SIMULATION See answers in IMAGE DF
,Which of the following will MOST likely negatively impact operations of unpatched classic
programmable-logic controllers, running a back-end LAMP server and OT systems with
human-management interfaces that are accessible over the Internet via a web interface?
(Choose two.)
A. Cross-site scripting
B. Data exfiltration
C. Poor system logging
D. Weak encryption
E. SQL injection
F. Server-side request forgery
A
The company recently moved to a purely BYOD culture after the cost of lost and/or
damaged corporate-owned mobile devices was considered.
Which of the following technologies would be BEST to balance the BYOD culture while
protecting the company's data?
A. Containerization
B. Geofencing
C. Full-disk encryption
D. Remote wipe
D
A CSO's main priorities center around how to better prepare for, respond to, and recover
from an attack so as to minimize the period of system downtime and maximize
organizational resilience should there be a ransomware attack.
Which of the following would BEST meet the goals of the CSO?
A. Use email-filtering software and centrally managed accounts, patch high-risk systems,
,and limit administration privileges on fileshares.
B. Purchase cyber insurance from a reputable provider to reduce costs when an incident
occurs.
C. End-user awareness training: Invest in end-user awareness training in order to shift
the long-term culture and behaviour of staff and executives, in order to reduce the
organisation's vulnerability to phishing attacks.
D. Application whitelisting, centralised event-log management, regular testing and
validation of full backups.
AC
An administrator wants to know why several wireless barcode scanners and wireless
computers cannot connect to the shipping server intermittently within a warehouse. The
barcode scanners and computers are all mounted on forklift trucks. In normal operation
they would move around a warehouse.
Which two actions should the engineer take to troubleshoot the problem? (Choose two.)
A. Perform a site survey
B. Deploy an FTK Imager
C. Create a heat map
D. Rogue access point scan
E. Security protocol implementations
F. Captive portal implementation
C
Which of the following would MOST likely define the roles and responsibilities of data
controllers and data processors?
, A. SSAE SOC 2
B. PCI DSS
C. GDPR
D. ISO 31000
C
Phishing and spear-phishing attacks have become a frequent issue for the staff of a
company.
Which of the following would MOST likely mitigate this situation?
A. DNSSEC and DMARC
B. DNS query logging
C.Mail exchanger records in the DNS exactly
D.Addition of DNS conditional forwarders
EF
Which of the following is the live acquisition of data for forensic analysis MOST
dependent upon? (Select two.)
A. Data availability
B. Legal hold
C. Cryptographic or hash algorithm
D. Data retention law
E. Value and volatility of data
F. Right-to-audit clauses
B
Which of the following incident response phases includes taking steps to safeguard
critical systems while sustaining business operations?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.