Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 4 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 381

Exam Question

Which of the following terms falls into the category of semi-authorized hacking activities?

A. Blue hat
B. Black hat
C. Gray hat
D. White hat

Correct Answer

C. Gray hat

Question 382

Exam Question

Which of the following terms fall into the category of authorized hacking activities? (Select 2 answers)

A. Black hat
B. Gray hat
C. White hat
D. Blue hat
E. Green hat

Correct Answer

C. White hat
D. Blue hat

Question 383

Exam Question

Which statements best describe the attributes of a script kiddie? (Select 2 answers)

A. Motivated by money
B. Low level of technical sophistication
C. Motivated by ideology
D. High level of technical sophistication
E. Lack of extensive resources/funding

Correct Answer

B. Low level of technical sophistication
E. Lack of extensive resources/funding

Question 384

Exam Question

Which of the following statements does not match a typical description of nation states or state-funded groups identified as threat actors?

A. Political or economic motivation
B. High level of technical sophistication
C. Advanced Persistent Threat (APT)
D. High level of resources/funding
E. Typically classified as an internal threat

Correct Answer

E. Typically classified as an internal threat

Question 385

Exam Question

Which statements best describe the attributes of an APT? (Select 3 answers)

A. Lack of extensive resources/funding
B. High level of technical sophistication
C. Extensive amount of resources/funding
D. Threat actors are individuals
E. Low level of technical sophistication
F. Typically funded by governments/nation states

Correct Answer

B. High level of technical sophistication
C. Extensive amount of resources/funding
F. Typically funded by governments/nation states

Question 386

Exam Question

Which of the following enables running macros in Microsoft Office applications?

A. DOM
B. VBA
C. SDK
D. RAD

Correct Answer

B. VBA

Question 387

Exam Question

Which of the following answers refers to a filename extension used in a cross-platform, general-purpose programming language?

A. .bat
B. .py
C. .ps1
D. .vbs

Correct Answer

B. .py

Question 388

Exam Question

Which type of DDoS attack targets industrial equipment and infrastructure?

A. IoT
B. ATT&CK
C. OT
D. IoC

Correct Answer

C. OT

Question 389

Exam Question

As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet.

A. True
B. False

Correct Answer

A. True

Question 390

Exam Question

Which of the following enables client-side URL redirection?

A. host
B. hosts
C. hostname
D. localhost

Correct Answer

B. hosts