CompTIA Security+ 2021

Here you have the best CompTIA SY0-601 practice exam questions

  • You have 860 total questions across 172 pages (5 per page)
  • These questions were last updated on February 20, 2026
  • This site is not affiliated with or endorsed by CompTIA.
Question 1 of 860

A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL, https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
Answer

Suggested Answer

The suggested answer is C.

The presence of a certificate mismatch warning when navigating to https://www.site.com implies that the user is being directed to a server presenting an incorrect SSL/TLS certificate. This situation typically arises from DNS poisoning, where the DNS records are tampered with, redirecting the user to a malicious server instead of the intended website. This manipulation causes the browser to detect that the certificate presented by the server does not match the expected certificate for the domain, triggering the warning. Domain hijacking involves taking control of the domain registration, which would not necessarily result in a certificate mismatch. On-path attacks and evil twin attacks involve different methods of intercepting or mimicking network traffic and would not typically result in a certificate mismatch warning.

Community Votes121 votes
CSuggested
55%
B
31%
A
11%
D
3%
Question 2 of 860

Which of the following tools is effective in preventing a user from accessing unauthorized removable media?
Answer

Suggested Answer

The suggested answer is A.

A USB data blocker is a device that prevents data transfer between a computer and a USB device while still allowing power to flow through, making it effective at preventing unauthorized access to removable media. This device blocks any data from being read or written to the USB device, ensuring that only charging can occur, minimizing the risk of data theft or malicious data transfer.

Community Votes74 votes
ASuggested
100%
Question 3 of 860

A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements?
Answer

Suggested Answer

The suggested answer is A.

A reverse proxy sits in front of web servers and forwards client requests to the appropriate back-end servers. It can offload tasks such as SSL termination, caching, and load balancing from the back-end servers, reducing their workload and resource utilization. Additionally, reverse proxies can distribute traffic among multiple back-end servers, improving scalability and flexibility. Since session persistence is not important for the applications running on the back-end servers, the reverse proxy can distribute requests dynamically without needing to maintain session state, further reducing the burden on individual servers. Reverse proxies meet the requirement for increased scalability and flexibility while allowing updates and modifications without disrupting the services.

Community Votes99 votes
ASuggested
93%
C
7%
Question 4 of 860

Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?
Answer

Suggested Answer

The suggested answer is A.

A phishing email stating that a cash settlement has been awarded but will expire soon describes a social engineering technique that seeks to exploit a person's sense of urgency. It creates a false sense of immediate action required to prevent missing out on something valuable, prompting the target to react quickly and often without careful consideration.

Community Votes82 votes
ASuggested
90%
C
9%
B
1%
Question 5 of 860

A security analyst is reviewing application logs to determine the source of a breach and locates the following log: https://www.comptia.com/login.php?id='%20or%20'1'1='1
Which of the following has been observed?
Answer

Suggested Answer

The suggested answer is C.

The provided log entry indicates a SQL injection (SQLi) attack. SQL injection occurs when an attacker inserts or

Community Votes64 votes
CSuggested
100%

About the CompTIA SY0-601 Certification Exam

About the Exam

The CompTIA SY0-601 (CompTIA Security+ 2021) validates your knowledge and skills. Passing demonstrates proficiency and can boost your career prospects in the field.

How to Prepare

Work through all 860 practice questions across 172 pages. Focus on understanding the reasoning behind each answer rather than memorizing responses to be ready for any variation on the real exam.

Why Practice Exams?

Practice exams help you familiarize yourself with the question format, manage your time, and reduce anxiety on the test day. Our SY0-601 questions are regularly updated to reflect the latest exam objectives.