Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 6 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 511

Exam Question

The arp command can be used to perform what kind of resolution?

A. IP to FQDN
B. MAC to IP
C. IP to MAC
D. FQDN to IP

Correct Answer

C. IP to MAC

Question 512

Exam Question

The practice of connecting to an open port on a remote host to gather more information about its configuration is known as:

A. Phishing
B. Bluesnarfing
C. Banner grabbing
D. eDiscovery

Correct Answer

C. Banner grabbing

Question 513

Exam Question

Netstat is a command-line utility used for: (Select 2 answers)

A. Displaying active TCP/IP connections
B. Testing the reachability of a remote host
C. Displaying intermediary points on the packet route
D. Viewing the TCP/IP configuration details
E. Displaying network protocol statistics

Correct Answer

A. Displaying active TCP/IP connections
E. Displaying network protocol statistics

Question 514

Exam Question

Which network command-line utility in MS Windows combines the features of ping and tracert?

A. nbtstat
B. pathping
C. traceroute
D. netstat

Correct Answer

B. pathping

Question 515

Exam Question

Which of the following command-line tools is used for discovering hosts and services on a network?

A. Zenmap
B. tracert
C. nmap
D. netcat

Correct Answer

C. nmap

Question 516

Exam Question

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?

A. ifconfig
B. nslookup
C. ipconfig
D. netstat

Correct Answer

C. ipconfig

Question 517

Exam Question

A Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as:

A. nbtstat
B. traceroute
C. netstat
D. tracert

Correct Answer

B. traceroute

Question 518

Exam Question

The term “Certificate chaining” refers to the process of verifying authenticity of a newly received digital certificate. Such process involves checking all the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate’s chain is properly issued and valid.

A. True
B. False

Correct Answer

A. True

Question 519

Exam Question

A trusted third-party storage solution providing backup source for cryptographic keys is referred to as:

A. Key escrow
B. TPM
C. Recovery agent
D. CA

Correct Answer

A. Key escrow

Question 520

Exam Question

Which of the following answers refers to a deprecated security mechanism designed to defend HTTPS websites against impersonation attacks performed with the use of fraudulent digital certificates?

A. Pinning
B. Extended Validation (EV)
C. Stapling
D. Certificate chaining

Correct Answer

A. Pinning