The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 501
- Exam Question
- Correct Answer
- Question 502
- Exam Question
- Correct Answer
- Question 503
- Exam Question
- Correct Answer
- Question 504
- Exam Question
- Correct Answer
- Question 505
- Exam Question
- Correct Answer
- Question 506
- Exam Question
- Correct Answer
- Question 507
- Exam Question
- Correct Answer
- Question 508
- Exam Question
- Correct Answer
- Question 509
- Exam Question
- Correct Answer
- Question 510
- Exam Question
- Correct Answer
Question 501
Exam Question
Which of the following tools enables sending custom packets that can be used to evaluate the security of a network device?
A. WireShark
B. Tcpreplay
C. tcpdump
D. theHarvester
Correct Answer
B. Tcpreplay
Question 502
Exam Question
Which of the following answers refers to a software library used to implement encrypted connections?
A. SDK
B. DNSSEC
C. OpenSSL
D. DLL
Correct Answer
C. OpenSSL
Question 503
Exam Question
A type of extended command-line shell and a scripting language designed to simplify administrative tasks in Microsoft Windows is known as:
A. Command Prompt
B. Windows PowerShell
C. Microsoft Management Console (MMC)
D. Windows Terminal
Correct Answer
B. Windows PowerShell
Question 504
Exam Question
What is the function of the Linux chmod command?
A. Changes file/directory access permissions
B. Moves or renames files
C. Changes file owner and group permissions
D. Compares the contents of two files or sets of files
Correct Answer
A. Changes file/directory access permissions
Question 505
Exam Question
A Linux command that allows to create, view, and concatenate files is called:
A. echo
B. concat
C. printf
D. cat
Correct Answer
D. cat
Question 506
Exam Question
A Linux command that allows to display the beginning of a file (by default its first 10 lines) is known as:
A. read
B. printf
C. head
D. echo
Correct Answer
C. head
Question 507
Exam Question
Which of the following tools offers the functionality of a configuration compliance scanner?
A. Zenmap
B. Roo
C. Nessus
D. DBAN
Correct Answer
C. Nessus
Question 508
Exam Question
Which of the following tools hides attacker’s identity by utilizing a proxy for port scanning?
A. tcpdump
B. Cuckoo
C. scanless
D. dnsenum
Correct Answer
C. scanless
Question 509
Exam Question
Which of the following tools is used for gathering OSINT?
A. Wireshark
B. theHarvester
C. Nessus
D. FTK imager
Correct Answer
B. theHarvester
Question 510
Exam Question
A Linux command-line command for displaying routing table contents is called:
A. print route
B. netstat -r
C. route print
D. netstat -a
Correct Answer
B. netstat -r