The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 561
- Exam Question
- Correct Answer
- Question 562
- Exam Question
- Correct Answer
- Question 563
- Exam Question
- Correct Answer
- Question 564
- Exam Question
- Correct Answer
- Question 565
- Exam Question
- Correct Answer
- Question 566
- Exam Question
- Correct Answer
- Question 567
- Exam Question
- Correct Answer
- Question 568
- Exam Question
- Correct Answer
- Question 569
- Exam Question
- Correct Answer
- Question 570
- Exam Question
- Correct Answer
Question 561
Exam Question
A mobile security solution that enables separate controls over the user and enterprise data is called:
A. Content management
B. Virtualization
C. Containerization
D. Storage segmentation
Correct Answer
D. Storage segmentation
Question 562
Exam Question
Context-aware authentication strengthens the authentication process by requiring the standard user credentials (username and password) to be coupled with additional items that can be used in the authentication process, such as:
A. Connection type used
B. Time of the day login patterns
C. Geolocation
D. Type of device used
E. IP address
F. All of the above
Correct Answer
F. All of the above
Question 563
Exam Question
A user interface element controlling access to a mobile device after the device is powered on is called:
A. Launcher
B. Screen lock
C. Privacy filter
D. Hardware lock
Correct Answer
B. Screen lock
Question 564
Exam Question
Which of the following allows to erase data on a lost or stolen mobile device?
A. Rooting
B. Sideloading
C. Low-level formatting
D. Remote wipe
Correct Answer
D. Remote wipe
Question 565
Exam Question
Which type of software enables a centralized administration of mobile devices?
A. MFA
B. MMC
C. MDM
D. MFD
Correct Answer
C. MDM
Question 566
Exam Question
Which of the following would prevent using a mobile device for data exfiltration via cable connection?
A. DLP
B. Full device encryption
C. Screen locks
D. COPE
Correct Answer
A. DLP
Question 567
Exam Question
A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:
A. RFID
B. NFC
C. Infrared(IR)
D. Bluetooth
Correct Answer
B. NFC
Question 568
Exam Question
A popular, 2.4 GHz short-range wireless technology used for connecting various personal devices in a WPAN is known as:
A. 802.11
B. NFC
C. Bluetooth
D. Z-Wave
Correct Answer
C. Bluetooth
Question 569
Exam Question
Which of the following answers refers to a broadband cellular network technology?
A. 4G/5G
B. WiFi
C. Bluetooth
D. NFC
E. Infrared (IR)
Correct Answer
A. 4G/5G
Question 570
Exam Question
Which wireless antenna type provides a 360-degree horizontal signal coverage?
A. Dish antenna
B. Unidirectional antenna
C. Yagi antenna
D. Omnidirectional antenna
Correct Answer
D. Omnidirectional antenna