The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 331
- Exam Question
- Correct Answer
- Question 332
- Exam Question
- Correct Answer
- Question 333
- Exam Question
- Correct Answer
- Question 334
- Exam Question
- Correct Answer
- Question 335
- Exam Question
- Correct Answer
- Question 336
- Exam Question
- Correct Answer
- Question 337
- Exam Question
- Correct Answer
- Question 338
- Exam Question
- Correct Answer
- Question 339
- Exam Question
- Correct Answer
- Question 340
- Exam Question
- Correct Answer
Question 331
Exam Question
Which of the answers listed below refers to the process of granting or denying access to resources?
A. Authentication
B. Authorization
C. Accounting
Correct Answer
B. Authorization
Question 332
Exam Question
Which of the following examples meets the requirement of multifactor authentication?
A. Password and biometric scan
B. Username and PIN
C. Smart card and ID badge
D. Voice recognition and fingerprint scan
Correct Answer
A. Password and biometric scan
Question 333
Exam Question
Which of the following fall into the category of MFA factors? (Select 3 answers)
A. GPS reading
B. Handwritten signature
C. PIN
D. Chain of trust
E. USB token
F. Gait analysis
G. Retina scan
Correct Answer
C. PIN
E. USB token
G. Retina scan
Question 334
Exam Question
Which of the answers listed below refers to a type of metric used for evaluation of a biometric security system’s accuracy?
A. FRR
B. CRC
C. FAR
D. CER
Correct Answer
D. CER
Question 335
Exam Question
A measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user is known as:
A. CRC
B. FAR
C. CER
D. FRR
Correct Answer
B. FAR
Question 336
Exam Question
In computer security, the term “Biometrics” refers to physical characteristics of the human body that can be used for identification and access control purposes.
A. True
B. False
Correct Answer
A. True
Question 337
Exam Question
Which of the following does not have an application in the authentication process?
A. One-time passwords
B. SMS messages
C. Hardware / Software tokens
D. Static codes
E. Push notifications
F. Phones
G. All of the above can be used in the authentication process
Correct Answer
G. All of the above can be used in the authentication process
Question 338
Exam Question
Examples of static authentication methods include: (Select 2 answers)
A. Token generator
B. User-generated password
C. Short Message Service (SMS)
D. Personal Identification Number (PIN)
E. Push notification
Correct Answer
B. User-generated password
D. Personal Identification Number (PIN)
Question 339
Exam Question
Which of the following are examples of hardware authentication tokens? (Select 3 answers)
A. Key fob
B. Cable lock
C. Passphrase
D. Biometric reader
E. RFID badge
F. Smart card
Correct Answer
A. Key fob
E. RFID badge
F. Smart card
Question 340
Exam Question
Which of the following answers describe the features of TOTP? (Select 3 answers)
A. Vulnerable to replay attacks
B. Based on a cryptographic hash function and a secret cryptographic key
C. Valid for multiple login sessions
D. Based on a shared secret key and current time
E. Not vulnerable to replay attacks
F. Valid for only one login session
Correct Answer
D. Based on a shared secret key and current time
E. Not vulnerable to replay attacks
F. Valid for only one login session