Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 2 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 171

Exam Question

Which of the following answers refers to a network debugging and exploration tool that can read and write data across TCP or UDP connections?

A. netcat
B. theHarvester
C. Cuckoo
D. tcpdump

Correct Answer

A. netcat

Question 172

Exam Question

Which of the following terms is used to describe a text message containing system information details displayed after connecting to a service on a server?

A. Log
B. Trap
C. Signature
D. Banner

Correct Answer

D. Banner

Question 173

Exam Question

Which of the following answers refers to a command-line tool used for security auditing and testing of firewalls and networks?

A. pathping
B. netstat
C. nslookup
D. hping

Correct Answer

D. hping

Question 174

Exam Question

A command-line utility used for checking the reachability of a remote network host is known as:

A. ping
B. tracert
C. dig
D. netstat

Correct Answer

A. ping

Question 175

Exam Question

The Linux command-line utility for network interface configuration is called:

A. ifconfig
B. netstat
C. nslookup
D. ipconfig

Correct Answer

A. ifconfig

Question 176

Exam Question

Which of the following answers refer to network administration command-line utilities used for DNS queries? (Select 2 answers)

A. dig
B. tracert
C. nslookup
D. ping
E. pathping

Correct Answer

A. dig
C. nslookup

Question 177

Exam Question

A network command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called:

A. ping
B. traceroute
C. nslookup
D. tracert

Correct Answer

D. tracert

Question 178

Exam Question

Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. Recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.

A. True
B. False

Correct Answer

A. True

Question 179

Exam Question

Which of the answers listed below refer to examples of PKI trust models?

A. Single CA model
B. Hierarchical model (root CA + intermediate CAs)
C. Mesh model (cross-certifying CAs)
D. Web of trust model (all CAs act as root CAs)
E. Client-server mutual authentication model
F. All of the above

Correct Answer

F. All of the above

Question 180

Exam Question

Which of the following allows for checking digital certificate revocation status without contacting Certificate Authority (CA)?

A. Stapling
B. Pinning
C. Sideloading
D. Skimming

Correct Answer

A. Stapling