CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-601 Practice Test

Prepare for the CompTIA Security+ SY0-601 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 60 seconds per question (0 hours, 15 minutes, 0 seconds)
  • Included Objectives:
    • Architecture and Design
    • Attacks, Threats, and Vulnerabilities
    • Implementation
    • Operations and Incident Response
    • Governance, Risk, and Compliance

You receive a call and the caller ID indicates that it is from your bank. You answer and are told that your account has been compromised. The person on the phone says that before they can proceed you need to verify your account number and security pin. What term best describes this type of social engineering attack?

  • Vishing

  • Spear phishing

  • Phishing

  • Whaling

  • Smishing

Which feature of MDM allows for the logical separation of work and personal tasks/storage on an employee's personal device?

  • Containerization

  • Application management

  • Content management

  • Storage segmentation

Your organization is facing litigation, and as part of the legal process, you are required to produce relevant digital documents and emails within a strict timeframe. You must ensure the integrity and authenticity of the evidence is maintained throughout the process. What is the most important initial step in the e-discovery process when responding to this legal request?

  • Issuing a legal hold to prevent the deletion of relevant data

  • Interviewing potential witnesses to gain more context about the incident

  • Beginning the metadata analysis of documents to locate pertinent information

  • Acquiring a forensic image of devices and systems involved

At Acme Corp, a policy requires all employees to take at least five consecutive business days of vacation each year. What is the primary security benefit of this policy?

  • It enables the detection of fraud or policy violations that might be covered by the absent employee.

  • It decreases the organization's reliance on any single employee by ensuring cross-training.

  • It reduces the cost of personnel by encouraging employees to use their vacation days.

  • It ensures that no employee becomes a bottleneck to productivity due to their absences.

Proper configuration of HVAC systems can minimize the risk of hardware failure due to static electricity buildup.

  • False

  • True

A government agency is designing a secure communication room where highly confidential conversations can take place without risk of electronic eavesdropping through radio frequency (RF) signals. Which of the following would most effectively ensure that RF signals cannot enter or leave the room?

  • Installing a Faraday cage around the room

  • Soundproofing the room with acoustic foam

  • Using TEMPEST shielding for all computers and phones inside the room

  • Building the walls of the room with reinforced concrete

When conducing digital forensics, order of volatility is an important consideration during the collection of data after an incident. With order of volatility in mind, which type of memory should evidence be collected from first?

  • Cache

  • Pagefile

  • Hard drive

  • RAM

A company has a strict policy against unauthorized recording of conversations during confidential meetings. To adhere to this policy when using mobile devices issued to employees, which of the following is the BEST solution to prevent unauthorized use of the microphone during these meetings?

  • Geofencing to disable microphones in secure areas

  • Installing a mobile antivirus with audio protection features

  • Physical removal of the microphone from mobile devices

  • Disallow all applications from requesting microphone access

  • Mandatory use of headphones without a built-in microphone

You want to limit the company losses/downtime in the event that there is data loss so you institute a data backup and recovery strategy. Which control type is being used?

  • Detective

  • Preventive

  • Deterrent

  • Compensating

  • Corrective

A medium-sized organization wants to improve its security posture by updating the way security training is delivered to its employees. They have decided to switch from in-person training sessions to an online platform that allows employees to complete security training modules at their own pace. What type of security awareness initiative does this represent?

  • Role-based training

  • Mandatory vacation

  • Computer-based training (CBT)

  • Web-based seminars

You are in the discovery/reconnaissance phase of a penetration test. You decided to use automated scanning software to gather recon data on the network under test before you attempt to penetrate. Which of the following could you use to preform this task?

  • Sn1per

  • Cuckoo

  • curl

  • theHarvester

You are responsible for network security within your employer's network architecture team. Your team is implementing a new network that can allow unauthenticated WiFi users access to the internet without allowing them access to any internal systems. What type of WiFi network is this?

  • Guest

  • DMZ

  • Extranet

  • NAT

When reviewing a security assessment report, analysts notice that several security incidents coincide with outgoing traffic spikes at regular intervals. What is the most likely explanation for these observations?

  • Command and Control (C2) server communication is likely causing the traffic spikes and related security incidents.

  • An internal user is downloading large files periodically, which aligns with the traffic spikes.

  • The organization is experiencing normal traffic burst due to scheduled backups.

  • The web server is performing automatic updates at set intervals, causing the observed traffic.

A developer is designing a web application and wants to ensure that detailed error messages do not expose sensitive system information to potential attackers. Which approach should the developer take when implementing error handling for the web application to enhance security?

  • Display a generic error message to the user and log the details of the error internally for review by developers.

  • Customize HTTP response codes to indicate the specific type of error that occurred.

  • Redirect the user to the home page whenever an error occurs without displaying any message.

  • Provide detailed error messages including system architecture and software version numbers.

What is the primary purpose of utilizing a hash function on a set of data?

  • To transform the data into a lower-case format for normalized comparison.

  • To compress the data into a smaller format for efficient storage.

  • To produce a fixed-size output that uniquely represents the data.

  • To obfuscate the data to protect sensitive information from being accessed.



Remaining Time 00:15:00