The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 421
- Exam Question
- Correct Answer
- Question 422
- Exam Question
- Correct Answer
- Question 423
- Exam Question
- Correct Answer
- Question 424
- Exam Question
- Correct Answer
- Question 425
- Exam Question
- Correct Answer
- Question 426
- Exam Question
- Correct Answer
- Question 427
- Exam Question
- Correct Answer
- Question 428
- Exam Question
- Correct Answer
- Question 429
- Exam Question
- Correct Answer
- Question 430
- Exam Question
- Correct Answer
Question 421
Exam Question
One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline.
A. True
B. False
Correct Answer
A. True
Question 422
Exam Question
Which password attack bypasses account-lockout policies?
A. Birthday attack
B. Spraying attack
C. Dictionary attack
D. Replay attack
Correct Answer
B. Spraying attack
Question 423
Exam Question
Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
A. Logic bomb
B. Trojan horse
C. Rootkit
D. Backdoor
Correct Answer
D. Backdoor
Question 424
Exam Question
Which type of Trojan enables unauthorized remote access to a compromised system?
A. pcap
B. RAT
C. MaaS
D. pfSense
Correct Answer
B. RAT
Question 425
Exam Question
Malicious software collecting information about users without their knowledge/consent is known as:
A. Cryptomalware
B. Adware
C. Ransomware
D. Spyware
Correct Answer
D. Spyware
Question 426
Exam Question
Which of the following is an example of cryptomalware?
A. Backdoor
B. Ransomware
C. Keylogger
D. Rootkit
Correct Answer
B. Ransomware
Question 427
Exam Question
A malware-infected network host under remote control of a hacker is commonly referred to as:
A. Trojan
B. Worm
C. Bot
D. Honeypot
Correct Answer
C. Bot
Question 428
Exam Question
Which type of malware resides only in RAM?
A. Rootkit
B. Fileless virus
C. Backdoor
D. Logic bomb
Correct Answer
B. Fileless virus
Question 429
Exam Question
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
A. Spyware
B. Worm
C. Trojan
D. Spam
Correct Answer
B. Worm
Question 430
Exam Question
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
A. Grayware
B. Adware
C. Ransomware
D. Spyware
Correct Answer
C. Ransomware