Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 4 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 391

Exam Question

Remapping a domain name to a rogue IP address is an example of what kind of exploit?

A. DNS poisoning
B. Domain hijacking
C. ARP poisoning
D. URL hijacking

Correct Answer

A. DNS poisoning

Question 392

Exam Question

Which of the following fall(s) into the category of Layer 2 attacks? (Select all that apply)

A. MAC cloning
B. ARP poisoning
C. MAC flooding
D. DNS poisoning
E. MAC spoofing

Correct Answer

A. MAC cloning
B. ARP poisoning
C. MAC flooding
E. MAC spoofing

Question 393

Exam Question

Media Access Control (MAC) flooding is a network attack that compromises the security of a network switch by overflowing its memory used to store the MAC address table.

A. True
B. False

Correct Answer

A. True

Question 394

Exam Question

Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)

A. An on-path attack is also known as MITM attack
B. In an on-path attack, attackers place themselves on the communication route between two devices
C. In an on-path attack, attackers intercept or modify packets sent between two communicating devices
D. In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices
E. In an on-path attack, attackers generate forged packets and inject them in the network

Correct Answer

A. An on-path attack is also known as MITM attack
B. In an on-path attack, attackers place themselves on the communication route between two devices
C. In an on-path attack, attackers intercept or modify packets sent between two communicating devices

Question 395

Exam Question

NFC is vulnerable to:

A. Data interception
B. Replay attacks
C. Denial-of-Service (DoS) attacks
D. All of the above

Correct Answer

D. All of the above

Question 396

Exam Question

RFID is vulnerable to:

A. Spoofing
B. Eavesdropping
C. Data interception
D. Replay attacks
E. Denial-of-Service (DoS) attacks
F. All of the above

Correct Answer

F. All of the above

Question 397

Exam Question

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

A. WTLS
B. GPS
C. RFID
D. WAF

Correct Answer

C. RFID

Question 398

Exam Question

A wireless disassociation attack is a type of: (Select 2 answers)

A. Cryptographic attack
B. Downgrade attack
C. Deauthentication attack
D. Brute-force attack
E. Denial-of-Service (DoS) attack

Correct Answer

C. Deauthentication attack
E. Denial-of-Service (DoS) attack

Question 399

Exam Question

Gaining unauthorized access to a Bluetooth device is referred to as:

A. Phishing
B. Bluejacking
C. Smishing
D. Bluesnarfing

Correct Answer

D. Bluesnarfing

Question 400

Exam Question

A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:

A. Pass the hash
B. Replay attack
C. Brute-force attack
D. Spraying attack

Correct Answer

A. Pass the hash