CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-601 Practice Test

Prepare for the CompTIA Security+ SY0-601 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • Operations and Incident Response
    • Attacks, Threats, and Vulnerabilities
    • Architecture and Design
    • Implementation
    • Governance, Risk, and Compliance

Which of the following is a type of malware that disguises itself as or embeds itself within legitimate software with the intent to carry out malicious actions once executed on a host system?

  • Adware

  • Spyware

  • Firmware

  • Trojan

The MITRE ATT&CK framework includes a matrix that is exclusive to mobile device platforms, and does not contain any techniques related to desktop-based operating systems.

  • True

  • False

An attacker has setup a fraudulent wireless access point on a company’s network that mimics one of the network’s legitimate access points. Through this fraudulent access point the attacker can gain access to the sensitive information transmitted by those who unwittingly connect to it. This fraudulent access point is known as what?

  • Rouge access point

  • Evil twin

  • Disassociation

  • Jamming

Which of the following terms describes an attacker trying to steal personal or sensitive information using a VoIP system?

  • Phishing

  • VoIP takeover

  • Vishing

  • Wishing

A company requires a network appliance at their branch office that exclusively serves the purpose of securely translating private IP addresses to public ones for outbound internet traffic, without incorporating any additional security or optimization services. Which device should be implemented to meet these specific needs with the least complexity?

  • Intrusion Detection System/Intrusion Prevention System (IDS/IPS)

  • Network Address Translation (NAT) gateway

  • Unified Threat Management (UTM) device

  • Load balancer

Which of the following best describes the strategy an organization should implement to actively reduce the potential impact of a security breach?

  • Implementing stronger access controls

  • Transferring risk to a cyber insurance company

  • Choosing not to act on a known risk

  • Accepting the potential impact of a security breach

A network administrator needs to ensure that a lost corporate smartphone does not pose a risk to company data. Which solution is primarily used to remotely wipe sensitive information from mobile devices that are registered to the organization?

  • Intrusion Detection System (IDS)

  • Data Loss Prevention (DLP) Software

  • Unified Threat Management (UTM) Appliance

  • Mobile Device Management (MDM) Solution

You just started at a new company and you are going through documentation to see what plans and policies are already in place. One of the things that you noticed is the company is not prepared with a plan to continue operations in the event of a disaster or an unplanned event. What type of plan do you need to develop for the company to be better prepared?

  • DRP

  • RTO

  • RTP

  • Communication plan

  • BCP

A company’s employees frequently communicate sensitive data through their company-issued mobile devices. Which of the following security measures would be BEST to implement to enhance the confidentiality and integrity of sensitive communications?

  • Implement a VPN solution for mobile devices.

  • Install antivirus software on all mobile devices.

  • Enable end-to-end encryption for all text-based communication.

  • Require device passwords on all mobile devices.

During an investigation, discovery of application logs indicating unusual patterns of behavior, temporary files with suspicious content, and abnormal registry key entries can be considered as examples of artifacts.

  • False

  • True

Your company has given you the responsibility to implement an appropriate access control scheme. The company wants to control access and permissions for employees based on job function. Which of the following should you use?

  • MAC

  • RuBAC

  • DAC

  • RBAC

Your coworker identified a vulnerability for a 3rd party software solution hosted on premise. The coworker is out sick today and has asked you remediate this issue as quickly as possible. You have identified a patch to fix the security vulnerability from the vendor's official website. What step should you take NEXT?

  • Install the patch immediately and inform affected users

  • Begin monitoring for related incidients

  • Start the incident response process

  • Submit a change request based on the companies change management processes

Which feature of MDM allows for the logical separation of work and personal tasks/storage on an employee's personal device?

  • Content management

  • Application management

  • Containerization

  • Storage segmentation

You work from home and realized you only really do about 20 hours of actual work. So to fill the other 20 hours of time you installed Steam and a few of your favorite games. Your boss, the Security Team Manager, asks you to ensure no one is able to install any games or gaming platforms on their work computer. You think he's probably trying to send you a message. What could you do to prevent yourself and other employees from installing things like Steam and video games on their PCs or work phones?

  • Implement a VPN with IPSec traffic tunneling

  • Implement a HTTP Proxy Firewall to block non-approved websites

  • Configure Host Based Firewalls on all devices

  • Implement application blacklisting

A smaller online retailer is experiencing huge numbers of requests on their websites. They are not running any major marketing campaigns and while seeing a lot of traffic are not seeing a rise in sales or logins. Eventually their web servers become overloaded and users are unable to load pages on the website. What type of attack most likely occurred?

  • Replay

  • DDOS

  • Jamming

  • Overflood



Remaining Time 00:15:00