Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 3 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 261

Exam Question

A private network’s segment made available for a trusted third party is an example of:

A. Internet
B. Extranet
C. Honeynet
D. Intranet

Correct Answer

B. Extranet

Question 262

Exam Question

A logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain regardless of their physical location is known as:

A. VLAN
B. Screened subnet
C. Intranet
D. SAN

Correct Answer

A. VLAN

Question 263

Exam Question

What type of IP address would be assigned to a software-based load balancer to handle an Internet site hosted on several web servers, each with its own private IP address?

A. IPv4 address
B. Virtual IP address
C. Non-routable IP address
D. IPv6 address

Correct Answer

B. Virtual IP address

Question 264

Exam Question

In a weighted round-robin load balancing method, each consecutive request is handled in a rotational fashion, but servers with higher specs are designated to process more workload.

A. True
B. False

Correct Answer

A. True

Question 265

Exam Question

In active-passive mode, load balancers distribute network traffic across:

A. All servers
B. Servers marked as active
C. Least utilized servers
D. Servers marked as passive

Correct Answer

B. Servers marked as active

Question 266

Exam Question

In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:

A. Sideloading
B. Containerization
C. Sandboxing
D. Stress testing

Correct Answer

C. Sandboxing

Question 267

Exam Question

Which of the following answers list examples of hardware root of trust? (Select 2 answers)

A. EFS
B. TPM
C. SED
D. HSM
E. FDE

Correct Answer

B. TPM
D. HSM

Question 268

Exam Question

A software technology designed to provide confidentiality for an entire data storage device is known as:

A. AES
B. FDE
C. EFS
D. HSM

Correct Answer

B. FDE

Question 269

Exam Question

Which of the following measures can be used in the hardening process?

A. Disabling unnecessary ports and services
B. Introducing changes to the Registry (MS Windows)
C. Implementing disk encryption
D. Keeping the system up to date via patch management process
E. All of the above

Correct Answer

E. All of the above

Question 270

Exam Question

Which of the following terms refers to an automated or manual code review process aimed at discovering logic and syntax errors in the application’s source code?

A. Input validation
B. Dynamic code analysis
C. Fuzzing
D. Static code analysis

Correct Answer

D. Static code analysis