00:15:00

Free CompTIA Security+ SY0-601 Practice Test

Prepare for the CompTIA Security+ SY0-601 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Attacks, Threats, and Vulnerabilities
    • Architecture and Design
    • Implementation
    • Operations and Incident Response
    • Governance, Risk, and Compliance
Question 1 of 15

An application developer is concerned about safeguarding his application against unauthorized code execution via third-party libraries. Which of the following methods would BEST mitigate the risk of an unauthorized Dynamic-link library (DLL) being injected and executed by the application?

  • Require all dynamic libraries to include a valid digital certificate.

  • Run the application within a restricted sandbox environment.

  • Restrict administrative privileges for all application users.

  • Enforce code signing of the third-party libraries.

Question 2 of 15

You have ordered a penetration test on the companies website from a 3rd party IT Security consultant. Your web administration team has created a stand-alone test network to ensure the penetration tests do not cause issues on the live website. Other than the IP address of the web server you have not provided the penetration testers with any information. What type of test best describes this scenario?

  • Stand alone

  • White box

  • Integration

  • Black box

Question 3 of 15

During digital forensics investigation procedures, what is the primary purpose of conducting interviews with relevant personnel?

  • To gather information and insights that complement digital evidence

  • To configure forensic software and hardware tools for data acquisition

  • To conduct performance evaluations of the IT staff's security practices

  • To install monitoring software on employees' workstations as a deterrent

  • To provide technical training to personnel on digital forensics tools

Question 4 of 15

Which containment technique would be the best response when a system is believed to be infected with malware?

  • Immediately segment the network into the smallest possible groups

  • Isolate the affected systems

  • Propagation

  • Determine the attack vector and disable it

Question 5 of 15

A network administrator suspects that an attacker is attempting to redirect traffic from a target workstation to the attacker's machine. Which of the following best describes an attack that can achieve this by exploiting the resolution of IP addresses to MAC addresses?

  • IV attack

  • URL redirection

  • ARP poisoning

  • DNS poisoning

Question 6 of 15

A cybersecurity team is evaluating Security orchestration, automation, and response (SOAR) platforms to improve their incident response times. Which of the following BEST describes a key benefit of implementing a SOAR solution?

  • Automating repetitive tasks and workflows to allow analysts to concentrate on high-level incident analysis and decision-making.

  • Streamlining communication channels between the cybersecurity team and the organization's upper management.

  • Integrating all threat intelligence feeds into a single platform for easier access.

  • Providing a centralized location for the storage and aggregation of all security logs.

Question 7 of 15

An organization is preparing to deploy a new server running a popular open-source operating system. To enhance the security of this server, which of the following would be the BEST resource to consult for hardening the system according to industry best practices?

  • A platform/vendor-specific guide for the operating system

  • National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)

  • Company-wide Acceptable Use Policy (AUP)

  • General Data Protection Regulation (GDPR) documentation

Question 8 of 15

What deployment model is characterized by the company providing employees with devices that are fully managed and controlled by the company, but also allows for limited personal use?

  • Bring your own device (BYOD)

  • Corporate-owned, personally enabled (COPE)

  • Choose your own device (CYOD)

  • Virtual desktop infrastructure (VDI)

Question 9 of 15

Your company is in the process of rapid expansion. As they bring on more employees you look at the current security posture and come to the realization that the company needs to enhance its protection of sensitive information. Which of the following should you suggest for the company?

  • DLP

  • Antivirus

  • HIDS

  • HIPS

Question 10 of 15

Which of the following firewall types is BEST suited for environments requiring simple filtering rules that are not dependent on the understanding of the connection state?

  • Web application firewall (WAF)

  • Network-based intrusion prevention system (NIPS)

  • Unified threat management (UTM) firewall

  • Stateless firewall

Question 11 of 15

Your organization is facing litigation, and as part of the legal process, you are required to produce relevant digital documents and emails within a strict timeframe. You must ensure the integrity and authenticity of the evidence is maintained throughout the process. What is the most important initial step in the e-discovery process when responding to this legal request?

  • Issuing a legal hold to prevent the deletion of relevant data

  • Interviewing potential witnesses to gain more context about the incident

  • Acquiring a forensic image of devices and systems involved

  • Beginning the metadata analysis of documents to locate pertinent information

Question 12 of 15

You are taking a walk around the neighborhood. You see a sign in one of your neighbor’s unfenced yards that reads “No trespassing!” in large red letters. The sign is what type of control?

  • Compensating

  • Deterrent

  • Preventive

  • Detective

  • Corrective

Question 13 of 15

During a regular security scan of the network you find that several user laptops are infected with the same malware. After cross-referencing the laptop users with the reverse proxy logs you find that they all accessed a industry news website the day before. You believe your organization may have been specifically targeted for this malware. What type of attack would best describe this theory?

  • Watering hole

  • Spoofing

  • SQL injection

  • SYN Flood

Question 14 of 15

Your team has identified an unauthorized individual attempting to exploit a known software vulnerability before a security patch is deployed company-wide. The intruder is systematically scanning for susceptible systems and seems to have in-depth knowledge of the vulnerable software. Which type of hacker best fits the characteristics of the intruder in this scenario?

  • Script Kiddies

  • Authorized Hackers

  • Unauthorized Hackers

  • Competitors

Question 15 of 15

During an audit it is identified that a host being used for FTP has additional unused ports open. The server is listening on 21, 20, 43, 80 and 3389. Your boss has tasked you to close the unused ports. Which ports should remain open?

  • 43

  • 43, 80

  • 80

  • 20, 3389

  • 20, 21

  • 3389