The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 241
- Exam Question
- Correct Answer
- Question 242
- Exam Question
- Correct Answer
- Question 243
- Exam Question
- Correct Answer
- Question 244
- Exam Question
- Correct Answer
- Question 245
- Exam Question
- Correct Answer
- Question 246
- Exam Question
- Correct Answer
- Question 247
- Exam Question
- Correct Answer
- Question 248
- Exam Question
- Correct Answer
- Question 249
- Exam Question
- Correct Answer
- Question 250
- Exam Question
- Correct Answer
Question 241
Exam Question
A monitoring port on a network device is referred to as:
A. Tap
B. Trunk port
C. Registered port
D. Trap
Correct Answer
A. Tap
Question 242
Exam Question
Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?
A. Measured service
B. Acceptable Use Policy (AUP)
C. Fair access policy
D. Quality of Service (QoS)
Correct Answer
D. Quality of Service (QoS)
Question 243
Exam Question
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
A. CRL
B. NAT
C. BCP
D. ACL
Correct Answer
D. ACL
Question 244
Exam Question
Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
A. NAC
B. ACL
C. NAT
D. DMZ
Correct Answer
C. NAT
Question 245
Exam Question
The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
A. True
B. False
Correct Answer
A. True
Question 246
Exam Question
Which of the terms listed below refers to the dynamic packet filtering concept?
A. Port mirroring
B. Stateful inspection
C. Out-of-band management
D. Stateless inspection
Correct Answer
B. Stateful inspection
Question 247
Exam Question
Which of the following answers refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?
A. EFS
B. HSM
C. SFC
D. TPM
Correct Answer
B. HSM
Question 248
Exam Question
A NIDS/NIPS that detects intrusions by comparing network traffic against the previously established baseline can be classified as: (Select all that apply)
A. Heuristic
B. Anomaly-based
C. Behavioral
D. Signature-based
Correct Answer
A. Heuristic
B. Anomaly-based
C. Behavioral
Question 249
Exam Question
A nontransparent proxy: (Select 2 answers)
A. Modifies client’s requests and responses
B. Doesn’t require client-side configuration
C. Requires client-side configuration
D. Redirects client’s requests and responses without modifying them
Correct Answer
A. Modifies client’s requests and responses
C. Requires client-side configuration
Question 250
Exam Question
Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)
A. Acts on behalf of a client
B. Hides the identity of a server
C. Acts on behalf of a server
D. Hides the identity of a client
Correct Answer
B. Hides the identity of a server
C. Acts on behalf of a server