The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 571
- Exam Question
- Correct Answer
- Question 572
- Exam Question
- Correct Answer
- Question 573
- Exam Question
- Correct Answer
- Question 574
- Exam Question
- Correct Answer
- Question 575
- Exam Question
- Correct Answer
- Question 576
- Exam Question
- Correct Answer
- Question 577
- Exam Question
- Correct Answer
- Question 578
- Exam Question
- Correct Answer
- Question 579
- Exam Question
- Correct Answer
- Question 580
- Exam Question
- Correct Answer
Question 571
Exam Question
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 – 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.
A. True
B. False
Correct Answer
A. True
Question 572
Exam Question
Which of the following answers refers to a diagnostic tool that can be used for measuring wireless signal strength?
A. Tone generator
B. Multimeter
C. WiFi analyzer
D. Network mapper
Correct Answer
C. WiFi analyzer
Question 573
Exam Question
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:
A. Penetration testing
B. Wireless site survey
C. Vulnerability scanning
D. End user awareness and training
Correct Answer
B. Wireless site survey
Question 574
Exam Question
Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)
A. WPS
B. WAP
C. WPA2
D. WAF
E. WEP
Correct Answer
A. WPS
E. WEP
Question 575
Exam Question
What are the characteristic features of WPA2/WPA3 Enterprise mode? (Select 3 answers)
A. Suitable for large corporate networks
B. IEEE 802.1D
C. Does not require an authentication server
D. IEEE 802.1X
E. Suitable for all types of wireless LANs
F. Requires RADIUS authentication server
Correct Answer
A. Suitable for large corporate networks
D. IEEE 802.1X
F. Requires RADIUS authentication server
Question 576
Exam Question
Which of the following answers refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?
A. IEEE 802.1X
B. IEEE 802.11ac
C. IEEE 802.1D
D. IEEE 802.11x
Correct Answer
A. IEEE 802.1X
Question 577
Exam Question
Which of the following EAP methods offers the highest level of security?
A. PEAP
B. EAP-FAST
C. EAP-TLS
D. EAP-TTLS
Correct Answer
C. EAP-TLS
Question 578
Exam Question
Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode?
A. SAE
B. IKE
C. RC4
D. PSK
E. AES
Correct Answer
A. SAE
Question 579
Exam Question
For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of: (Select 2 answers)
A. AES-GCMP
B. PSK
C. TKIP with RC4
D. RC4
E. AES-CCMP
F. SAE
Correct Answer
A. AES-GCMP
E. AES-CCMP
Question 580
Exam Question
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
A. AES
B. DES
C. RC4
D. 3DES
Correct Answer
A. AES