Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Free CompTIA SY0-601 Exam Dumps

Here you can find all the free questions related with CompTIA Security+ Exam (SY0-601) exam. You can also find on this page links to recently updated premium files with which you can practice for actual CompTIA Security+ Exam . These premium versions are provided as SY0-601 exam practice tests, both as desktop software and browser based application, you can use whatever suits your style. Feel free to try the CompTIA Security+ Exam premium files for free, Good luck with your CompTIA Security+ Exam .
Question No: 1

MultipleChoice

A security administrator is managing administrative access to sensitive systems with the following requirements:

* Common login accounts must not be used for administrative duties.

* Administrative accounts must be temporal in nature.

* Each administrative account must be assigned to one specific user.

* Accounts must have complex passwords.

' Audit trails and logging must be enabled on all systems.

Which of the following solutions should the administrator deploy to meet these requirements? (Give Explanation and References from CompTIA Security+ SY0-601 Official Text Book and Resources)

Options
Question No: 2

MultipleChoice

During an assessment, a systems administrator found several hosts running FTP and decided to immediately block FTP communications at the firewall. Which of the following describes the

greatest risk associated with using FTP?

A Private data can be leaked

Options
Question No: 3

MultipleChoice

A new security engineer has started hardening systems. One of the hardening techniques the engineer is using involves disabling remote logins to the NAS. Users are now reporting the inability to use SCP to transfer files to the NAS, even though the data is still viewable from the users' PCs. Which of the following is the MOST likely cause of this issue?

A TFTP was disabled on the local hosts

Options
Question No: 4

MultipleChoice

Given the following snippet of Python code:

Which of the following types of malware MOST likely contains this snippet?

Options
Question No: 5

Hotspot

A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.

INSTRUCTIONS

Click on each firewall to do the following:

1. Deny cleartext web traffic

2. Ensure secure management protocols are used.

3. Resolve issues at the DR site.

The ruleset order cannot be modified due to outside constraints.

Hat any time you would like to bring back the initial state of the simulation, please dick the Reset All button.

In Firewall 1, HTTP inbound Action should be DENY. As shown below

In Firewall 2, Management Service should be DNS, As shown below.

In Firewall 3, HTTP Inbound Action should be DENY, as shown below

Question No: 6

Hotspot

A systems administrator needs to install a new wireless network for authenticated guest access. The wireless network should support 802. IX using the most secure encryption and protocol available.

Perform the following steps:

1. Configure the RADIUS server.

2. Configure the WiFi controller.

3. Preconfigure the client for an

incoming guest. The guest AD

credentials are:

User: guest01

Password: guestpass

Wifi Controller

SSID: CORPGUEST

SHARED KEY: Secret

AAA server IP: 192.168.1.20

PSK: Blank

Authentication type: WPA2-EAP-PEAP-MSCHAPv2

Controller IP: 192.168.1.10

Radius Server

Shared Key: Secret

Client IP: 192.168.1.10

Authentication Type: Active Directory

Server IP: 192.168.1.20

Wireless Client

SSID: CORPGUEST

Username: guest01

Userpassword: guestpass

PSK: Blank

Authentication type: WPA2-Enterprise

Question No: 7

MultipleChoice

Given the following snippet of Python code:

Options
Question No: 8

MultipleChoice

A security analyst is evaluating solutions to deploy an additional layer of protection for a web application The goal is to allow only encrypted communications without relying on network devices Which of the following can be implemented?

Options
Question No: 9

MultipleChoice

Which of the following components can be used to consolidate and forward inbound Internet traffic to multiple cloud environments though a single firewall?

Options
Question No: 10

MultipleChoice

A company is receiving emails with links to phishing sites that look very similar to the company's own website address and content. Which of the following is the BEST way for the company to mitigate this attack?

Options

Save Cancel