Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 4 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 331

Exam Question

Which of the answers listed below refers to the process of granting or denying access to resources?

A. Authentication
B. Authorization
C. Accounting

Correct Answer

B. Authorization

Question 332

Exam Question

Which of the following examples meets the requirement of multifactor authentication?

A. Password and biometric scan
B. Username and PIN
C. Smart card and ID badge
D. Voice recognition and fingerprint scan

Correct Answer

A. Password and biometric scan

Question 333

Exam Question

Which of the following fall into the category of MFA factors? (Select 3 answers)

A. GPS reading
B. Handwritten signature
C. PIN
D. Chain of trust
E. USB token
F. Gait analysis
G. Retina scan

Correct Answer

C. PIN
E. USB token
G. Retina scan

Question 334

Exam Question

Which of the answers listed below refers to a type of metric used for evaluation of a biometric security system’s accuracy?

A. FRR
B. CRC
C. FAR
D. CER

Correct Answer

D. CER

Question 335

Exam Question

A measure of the likelihood that a biometric security system will incorrectly accept an access attempt by an unauthorized user is known as:

A. CRC
B. FAR
C. CER
D. FRR

Correct Answer

B. FAR

Question 336

Exam Question

In computer security, the term “Biometrics” refers to physical characteristics of the human body that can be used for identification and access control purposes.

A. True
B. False

Correct Answer

A. True

Question 337

Exam Question

Which of the following does not have an application in the authentication process?

A. One-time passwords
B. SMS messages
C. Hardware / Software tokens
D. Static codes
E. Push notifications
F. Phones
G. All of the above can be used in the authentication process

Correct Answer

G. All of the above can be used in the authentication process

Question 338

Exam Question

Examples of static authentication methods include: (Select 2 answers)

A. Token generator
B. User-generated password
C. Short Message Service (SMS)
D. Personal Identification Number (PIN)
E. Push notification

Correct Answer

B. User-generated password
D. Personal Identification Number (PIN)

Question 339

Exam Question

Which of the following are examples of hardware authentication tokens? (Select 3 answers)

A. Key fob
B. Cable lock
C. Passphrase
D. Biometric reader
E. RFID badge
F. Smart card

Correct Answer

A. Key fob
E. RFID badge
F. Smart card

Question 340

Exam Question

Which of the following answers describe the features of TOTP? (Select 3 answers)

A. Vulnerable to replay attacks
B. Based on a cryptographic hash function and a secret cryptographic key
C. Valid for multiple login sessions
D. Based on a shared secret key and current time
E. Not vulnerable to replay attacks
F. Valid for only one login session

Correct Answer

D. Based on a shared secret key and current time
E. Not vulnerable to replay attacks
F. Valid for only one login session