The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 151
- Exam Question
- Correct Answer
- Question 152
- Exam Question
- Correct Answer
- Question 153
- Exam Question
- Correct Answer
- Question 154
- Exam Question
- Correct Answer
- Question 155
- Exam Question
- Correct Answer
- Question 156
- Exam Question
- Correct Answer
- Question 157
- Exam Question
- Correct Answer
- Question 158
- Exam Question
- Correct Answer
- Question 159
- Exam Question
- Correct Answer
- Question 160
- Exam Question
- Correct Answer
Question 151
Exam Question
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?
A. L2TP
B. BGP
C. RSTP
D. SIP
Correct Answer
D. SIP
Question 152
Exam Question
Which SIEM dashboard configuration setting provides a countermeasure against false positive/negative errors?
A. Sensors
B. Correlation
C. Alerts
D. Sensitivity levels
Correct Answer
D. Sensitivity levels
Question 153
Exam Question
Which of the following terms refers to a group of experts designated to handle a natural disaster or an interruption of business operations?
A. IETF
B. CSIRT
C. IRT
D. IRTF
Correct Answer
C. IRT
Question 154
Exam Question
Which of the following answers refers to a 7-step military model adopted by Lockheed Martin to identify the phases of a cyberattack?
A. MITRE ATT&CK
B. The Diamond Model of Intrusion Analysis
C. Cyber Kill Chain
Correct Answer
C. Cyber Kill Chain
Question 155
Exam Question
A globally accessible knowledge base of Adversary Tactics, Techniques, and Procedures (TTPs) based on observations from real-world attacks is known as:
A. MITRE ATT&CK
B. The Diamond Model of Intrusion Analysis
C. Cyber Kill Chain
Correct Answer
A. MITRE ATT&CK
Question 156
Exam Question
Examples of password-cracking utilities include: (Select 2 answers)
A. Nessus
B. John the Ripper
C. Cuckoo
D. Cain & Abel
E. OpenVAS
Correct Answer
B. John the Ripper
D. Cain & Abel
Question 157
Exam Question
Which of the following answers refers to an open-source forensics platform that allows to examine the contents of a hard drive or mobile device and recover evidence from it?
A. Memdump
B. FTK imager
C. Autopsy
D. Metasploit
Correct Answer
C. Autopsy
Question 158
Exam Question
Which of the following answers refers to a multi-function disk and binary data editor used for low-level data processing, data recovery, and digital forensics?
A. WinDump
B. Autopsy
C. Memdump
D. WinHex
Correct Answer
D. WinHex
Question 159
Exam Question
A Linux command-line utility that can be used in the forensic process for creating and copying image files is called:
A. fsutil
B. diskpart
C. dd
D. format
Correct Answer
C. dd
Question 160
Exam Question
Which of the following is a Command-Line Interface (CLI) packet-capturing tool used in Unix-like operating systems?
A. tcpdump
B. WireShark
C. theHarvester
D. Tcpreplay
Correct Answer
A. tcpdump