The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 381
- Exam Question
- Correct Answer
- Question 382
- Exam Question
- Correct Answer
- Question 383
- Exam Question
- Correct Answer
- Question 384
- Exam Question
- Correct Answer
- Question 385
- Exam Question
- Correct Answer
- Question 386
- Exam Question
- Correct Answer
- Question 387
- Exam Question
- Correct Answer
- Question 388
- Exam Question
- Correct Answer
- Question 389
- Exam Question
- Correct Answer
- Question 390
- Exam Question
- Correct Answer
Question 381
Exam Question
Which of the following terms falls into the category of semi-authorized hacking activities?
A. Blue hat
B. Black hat
C. Gray hat
D. White hat
Correct Answer
C. Gray hat
Question 382
Exam Question
Which of the following terms fall into the category of authorized hacking activities? (Select 2 answers)
A. Black hat
B. Gray hat
C. White hat
D. Blue hat
E. Green hat
Correct Answer
C. White hat
D. Blue hat
Question 383
Exam Question
Which statements best describe the attributes of a script kiddie? (Select 2 answers)
A. Motivated by money
B. Low level of technical sophistication
C. Motivated by ideology
D. High level of technical sophistication
E. Lack of extensive resources/funding
Correct Answer
B. Low level of technical sophistication
E. Lack of extensive resources/funding
Question 384
Exam Question
Which of the following statements does not match a typical description of nation states or state-funded groups identified as threat actors?
A. Political or economic motivation
B. High level of technical sophistication
C. Advanced Persistent Threat (APT)
D. High level of resources/funding
E. Typically classified as an internal threat
Correct Answer
E. Typically classified as an internal threat
Question 385
Exam Question
Which statements best describe the attributes of an APT? (Select 3 answers)
A. Lack of extensive resources/funding
B. High level of technical sophistication
C. Extensive amount of resources/funding
D. Threat actors are individuals
E. Low level of technical sophistication
F. Typically funded by governments/nation states
Correct Answer
B. High level of technical sophistication
C. Extensive amount of resources/funding
F. Typically funded by governments/nation states
Question 386
Exam Question
Which of the following enables running macros in Microsoft Office applications?
A. DOM
B. VBA
C. SDK
D. RAD
Correct Answer
B. VBA
Question 387
Exam Question
Which of the following answers refers to a filename extension used in a cross-platform, general-purpose programming language?
A. .bat
B. .py
C. .ps1
D. .vbs
Correct Answer
B. .py
Question 388
Exam Question
Which type of DDoS attack targets industrial equipment and infrastructure?
A. IoT
B. ATT&CK
C. OT
D. IoC
Correct Answer
C. OT
Question 389
Exam Question
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet.
A. True
B. False
Correct Answer
A. True
Question 390
Exam Question
Which of the following enables client-side URL redirection?
A. host
B. hosts
C. hostname
D. localhost
Correct Answer
B. hosts