Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 3 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 241

Exam Question

A monitoring port on a network device is referred to as:

A. Tap
B. Trunk port
C. Registered port
D. Trap

Correct Answer

A. Tap

Question 242

Exam Question

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?

A. Measured service
B. Acceptable Use Policy (AUP)
C. Fair access policy
D. Quality of Service (QoS)

Correct Answer

D. Quality of Service (QoS)

Question 243

Exam Question

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A. CRL
B. NAT
C. BCP
D. ACL

Correct Answer

D. ACL

Question 244

Exam Question

Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

A. NAC
B. ACL
C. NAT
D. DMZ

Correct Answer

C. NAT

Question 245

Exam Question

The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.

A. True
B. False

Correct Answer

A. True

Question 246

Exam Question

Which of the terms listed below refers to the dynamic packet filtering concept?

A. Port mirroring
B. Stateful inspection
C. Out-of-band management
D. Stateless inspection

Correct Answer

B. Stateful inspection

Question 247

Exam Question

Which of the following answers refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?

A. EFS
B. HSM
C. SFC
D. TPM

Correct Answer

B. HSM

Question 248

Exam Question

A NIDS/NIPS that detects intrusions by comparing network traffic against the previously established baseline can be classified as: (Select all that apply)

A. Heuristic
B. Anomaly-based
C. Behavioral
D. Signature-based

Correct Answer

A. Heuristic
B. Anomaly-based
C. Behavioral

Question 249

Exam Question

A nontransparent proxy: (Select 2 answers)

A. Modifies client’s requests and responses
B. Doesn’t require client-side configuration
C. Requires client-side configuration
D. Redirects client’s requests and responses without modifying them

Correct Answer

A. Modifies client’s requests and responses
C. Requires client-side configuration

Question 250

Exam Question

Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)

A. Acts on behalf of a client
B. Hides the identity of a server
C. Acts on behalf of a server
D. Hides the identity of a client

Correct Answer

B. Hides the identity of a server
C. Acts on behalf of a server