Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 4 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 301

Exam Question

What are the characteristic features of a session key? (Select 2 answers)

A. Used during a single session
B. Asymmetric key
C. Reused during multiple sessions
D. Symmetric key

Correct Answer

A. Used during a single session
D. Symmetric key

Question 302

Exam Question

According to predictions, the most future-proof cryptographic solution should be:

A. Quantum cryptography
B. Symmetric-key cryptography
C. Post-quantum cryptography
D. Asymmetric-key cryptography
E. Public-key cryptography

Correct Answer

C. Post-quantum cryptography

Question 303

Exam Question

Which of the following answers refers to a solution designed to strengthen the security of session keys?

A. ECB
B. PFS
C. EFS
D. PFX

Correct Answer

B. PFS

Question 304

Exam Question

Pseudo-random data added to a password before hashing is called:

A. Shim
B. Salt
C. Seed
D. IV

Correct Answer

B. Salt

Question 305

Exam Question

Examples of key stretching algorithms include: (Select 2 answers)

A. ROT13
B. Twofish
C. Bcrypt
D. DSA
E. PBKDF2

Correct Answer

C. Bcrypt
E. PBKDF2

Question 306

Exam Question

In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.

A. True
B. False

Correct Answer

A. True

Question 307

Exam Question

One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).

A. True
B. False

Correct Answer

A. True

Question 308

Exam Question

Which of the following destruction tools/methods allow(s) for secure disposal of physical documents? (Select all that apply)

A. Shredding
B. Hard drive sanitization
C. Burning
D. Low-level formatting
E. Degaussing

Correct Answer

A. Shredding
C. Burning

Question 309

Exam Question

A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:

A. Honeynet
B. Virtual Private Network (VPN)
C. Extranet
D. Screened subnet

Correct Answer

D. Screened subnet

Question 310

Exam Question

Which of the following answers refer(s) to the characteristic feature(s) of Faraday cage? (Select all that apply)

A. Physical security control type
B. Provides protection against RFI
C. Technical security control type
D. Provides protection against EMI
E. Administrative security control type

Correct Answer

A. Physical security control type
B. Provides protection against RFI
D. Provides protection against EMI