The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 391
- Exam Question
- Correct Answer
- Question 392
- Exam Question
- Correct Answer
- Question 393
- Exam Question
- Correct Answer
- Question 394
- Exam Question
- Correct Answer
- Question 395
- Exam Question
- Correct Answer
- Question 396
- Exam Question
- Correct Answer
- Question 397
- Exam Question
- Correct Answer
- Question 398
- Exam Question
- Correct Answer
- Question 399
- Exam Question
- Correct Answer
- Question 400
- Exam Question
- Correct Answer
Question 391
Exam Question
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
A. DNS poisoning
B. Domain hijacking
C. ARP poisoning
D. URL hijacking
Correct Answer
A. DNS poisoning
Question 392
Exam Question
Which of the following fall(s) into the category of Layer 2 attacks? (Select all that apply)
A. MAC cloning
B. ARP poisoning
C. MAC flooding
D. DNS poisoning
E. MAC spoofing
Correct Answer
A. MAC cloning
B. ARP poisoning
C. MAC flooding
E. MAC spoofing
Question 393
Exam Question
Media Access Control (MAC) flooding is a network attack that compromises the security of a network switch by overflowing its memory used to store the MAC address table.
A. True
B. False
Correct Answer
A. True
Question 394
Exam Question
Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)
A. An on-path attack is also known as MITM attack
B. In an on-path attack, attackers place themselves on the communication route between two devices
C. In an on-path attack, attackers intercept or modify packets sent between two communicating devices
D. In an on-path attack, attackers do not have access to packets exchanged during the communication between two devices
E. In an on-path attack, attackers generate forged packets and inject them in the network
Correct Answer
A. An on-path attack is also known as MITM attack
B. In an on-path attack, attackers place themselves on the communication route between two devices
C. In an on-path attack, attackers intercept or modify packets sent between two communicating devices
Question 395
Exam Question
NFC is vulnerable to:
A. Data interception
B. Replay attacks
C. Denial-of-Service (DoS) attacks
D. All of the above
Correct Answer
D. All of the above
Question 396
Exam Question
RFID is vulnerable to:
A. Spoofing
B. Eavesdropping
C. Data interception
D. Replay attacks
E. Denial-of-Service (DoS) attacks
F. All of the above
Correct Answer
F. All of the above
Question 397
Exam Question
Which of the following wireless technologies enables identification and tracking of tags attached to objects?
A. WTLS
B. GPS
C. RFID
D. WAF
Correct Answer
C. RFID
Question 398
Exam Question
A wireless disassociation attack is a type of: (Select 2 answers)
A. Cryptographic attack
B. Downgrade attack
C. Deauthentication attack
D. Brute-force attack
E. Denial-of-Service (DoS) attack
Correct Answer
C. Deauthentication attack
E. Denial-of-Service (DoS) attack
Question 399
Exam Question
Gaining unauthorized access to a Bluetooth device is referred to as:
A. Phishing
B. Bluejacking
C. Smishing
D. Bluesnarfing
Correct Answer
D. Bluesnarfing
Question 400
Exam Question
A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:
A. Pass the hash
B. Replay attack
C. Brute-force attack
D. Spraying attack
Correct Answer
A. Pass the hash