The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 301
- Exam Question
- Correct Answer
- Question 302
- Exam Question
- Correct Answer
- Question 303
- Exam Question
- Correct Answer
- Question 304
- Exam Question
- Correct Answer
- Question 305
- Exam Question
- Correct Answer
- Question 306
- Exam Question
- Correct Answer
- Question 307
- Exam Question
- Correct Answer
- Question 308
- Exam Question
- Correct Answer
- Question 309
- Exam Question
- Correct Answer
- Question 310
- Exam Question
- Correct Answer
Question 301
Exam Question
What are the characteristic features of a session key? (Select 2 answers)
A. Used during a single session
B. Asymmetric key
C. Reused during multiple sessions
D. Symmetric key
Correct Answer
A. Used during a single session
D. Symmetric key
Question 302
Exam Question
According to predictions, the most future-proof cryptographic solution should be:
A. Quantum cryptography
B. Symmetric-key cryptography
C. Post-quantum cryptography
D. Asymmetric-key cryptography
E. Public-key cryptography
Correct Answer
C. Post-quantum cryptography
Question 303
Exam Question
Which of the following answers refers to a solution designed to strengthen the security of session keys?
A. ECB
B. PFS
C. EFS
D. PFX
Correct Answer
B. PFS
Question 304
Exam Question
Pseudo-random data added to a password before hashing is called:
A. Shim
B. Salt
C. Seed
D. IV
Correct Answer
B. Salt
Question 305
Exam Question
Examples of key stretching algorithms include: (Select 2 answers)
A. ROT13
B. Twofish
C. Bcrypt
D. DSA
E. PBKDF2
Correct Answer
C. Bcrypt
E. PBKDF2
Question 306
Exam Question
In cryptography, the number of bits in a key used by a cryptographic algorithm is referred to as a key size or key length. The key length determines the maximum number of combinations required to break the encryption algorithm, therefore typically a longer key means stronger cryptographic security.
A. True
B. False
Correct Answer
A. True
Question 307
Exam Question
One of the ways of confirming that a software application comes from a trusted source is the verification of its digital signature. A digitally signed software proves the identity of the developer and guarantees that the application code has not been tampered with since it was signed. The authenticity and integrity of the application’s code can be verified by comparing results of a cryptographic hash function (original hash published by the application developer vs. hash obtained from a downloaded app).
A. True
B. False
Correct Answer
A. True
Question 308
Exam Question
Which of the following destruction tools/methods allow(s) for secure disposal of physical documents? (Select all that apply)
A. Shredding
B. Hard drive sanitization
C. Burning
D. Low-level formatting
E. Degaussing
Correct Answer
A. Shredding
C. Burning
Question 309
Exam Question
A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:
A. Honeynet
B. Virtual Private Network (VPN)
C. Extranet
D. Screened subnet
Correct Answer
D. Screened subnet
Question 310
Exam Question
Which of the following answers refer(s) to the characteristic feature(s) of Faraday cage? (Select all that apply)
A. Physical security control type
B. Provides protection against RFI
C. Technical security control type
D. Provides protection against EMI
E. Administrative security control type
Correct Answer
A. Physical security control type
B. Provides protection against RFI
D. Provides protection against EMI