The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 261
- Exam Question
- Correct Answer
- Question 262
- Exam Question
- Correct Answer
- Question 263
- Exam Question
- Correct Answer
- Question 264
- Exam Question
- Correct Answer
- Question 265
- Exam Question
- Correct Answer
- Question 266
- Exam Question
- Correct Answer
- Question 267
- Exam Question
- Correct Answer
- Question 268
- Exam Question
- Correct Answer
- Question 269
- Exam Question
- Correct Answer
- Question 270
- Exam Question
- Correct Answer
Question 261
Exam Question
A private network’s segment made available for a trusted third party is an example of:
A. Internet
B. Extranet
C. Honeynet
D. Intranet
Correct Answer
B. Extranet
Question 262
Exam Question
A logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location is known as:
A. VLAN
B. Screened subnet
C. Intranet
D. SAN
Correct Answer
A. VLAN
Question 263
Exam Question
What type of IP address would be assigned to a software-based load balancer to handle an Internet site hosted on several web servers, each with its own private IP address?
A. IPv4 address
B. Virtual IP address
C. Non-routable IP address
D. IPv6 address
Correct Answer
B. Virtual IP address
Question 264
Exam Question
In a weighted round-robin load balancing method, each consecutive request is handled in a rotational fashion, but servers with higher specs are designated to process more workload.
A. True
B. False
Correct Answer
A. True
Question 265
Exam Question
In active-passive mode, load balancers distribute network traffic across:
A. All servers
B. Servers marked as active
C. Least utilized servers
D. Servers marked as passive
Correct Answer
B. Servers marked as active
Question 266
Exam Question
In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:
A. Sideloading
B. Containerization
C. Sandboxing
D. Stress testing
Correct Answer
C. Sandboxing
Question 267
Exam Question
Which of the following answers list examples of hardware root of trust? (Select 2 answers)
A. EFS
B. TPM
C. SED
D. HSM
E. FDE
Correct Answer
B. TPM
D. HSM
Question 268
Exam Question
A software technology designed to provide confidentiality for an entire data storage device is known as:
A. AES
B. FDE
C. EFS
D. HSM
Correct Answer
B. FDE
Question 269
Exam Question
Which of the following measures can be used in the hardening process?
A. Disabling unnecessary ports and services
B. Introducing changes to the Registry (MS Windows)
C. Implementing disk encryption
D. Keeping the system up to date via patch management process
E. All of the above
Correct Answer
E. All of the above
Question 270
Exam Question
Which of the following terms refers to an automated or manual code review process aimed at discovering logic and syntax errors in the application’s source code?
A. Input validation
B. Dynamic code analysis
C. Fuzzing
D. Static code analysis
Correct Answer
D. Static code analysis