The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 521
- Exam Question
- Correct Answer
- Question 522
- Exam Question
- Correct Answer
- Question 523
- Exam Question
- Correct Answer
- Question 524
- Exam Question
- Correct Answer
- Question 525
- Exam Question
- Correct Answer
- Question 526
- Exam Question
- Correct Answer
- Question 527
- Exam Question
- Correct Answer
- Question 528
- Exam Question
- Correct Answer
- Question 529
- Exam Question
- Correct Answer
- Question 530
- Exam Question
- Correct Answer
Question 521
Exam Question
Which of the following answers refer to the P7B digital certificate format? (Select 3 answers)
A. Encoded in text (ASCII Base64) format
B. .p7b file extension
C. Generally used for Microsoft windows and Java Tomcat servers
D. Encoded in binary format
E. .der and .cer file extensions
F. Generally used for Apache servers or similar configurations
Correct Answer
A. Encoded in text (ASCII Base64) format
B. .p7b file extension
C. Generally used for Microsoft windows and Java Tomcat servers
Question 522
Exam Question
Which of the following answers refer to the Privacy Enhanced Email (PEM) digital certificate format? (Select 3 answers)
A. Encoded in binary format
B. .pfx and .p12 file extensions
C. Generally used for Java servers
D. Encoded in text (ASCII Base64) format
E. .pem, .crt, .cer and .key file extensions
F. Generally used for Apache servers or similar configurations
Correct Answer
D. Encoded in text (ASCII Base64) format
E. .pem, .crt, .cer and .key file extensions
F. Generally used for Apache servers or similar configurations
Question 523
Exam Question
Code-signing certificates are used to verify the authenticity and integrity of software. Self-signed certificates have a lower level of trustworthiness, because they are not signed by a Certificate Authority (CA). Computer certificates (a.k.a. machine certificates) are used to prove the identity of devices. S/MIME certificates are used to encrypt and digitally sign email messages. User digital certificates provide improved security during authentication and authorization of individuals. Root certificates are self-signed certificates that identify a root Certificate Authority (CA). Domain validation certificates prove a user’s ownership rights to a domain. Extended Validation (EV) certificates provide the highest level of trust and protection.
A. True
B. False
Correct Answer
A. True
Question 524
Exam Question
Which digital certificate type allows multiple subdomains to be protected by a single certificate?
A. Root signing certificate
B. Subject Alternative Name (SAN) certificate
C. Extended Validation (EV) certificate
D. Wildcard certificate
Correct Answer
D. Wildcard certificate
Question 525
Exam Question
Which of the answers listed below refers to a method for requesting a digital certificate?
A. CBC
B. CSR
C. CFB
D. CRL
Correct Answer
B. CSR
Question 526
Exam Question
Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers)
A. CIRT
B. CRL
C. OCSP
D. CSR
E. Key escrow
Correct Answer
B. CRL
C. OCSP
Question 527
Exam Question
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
A. RA
B. IKE
C. CA
D. CSP
Correct Answer
C. CA
Question 528
Exam Question
Which of the following answers refers to a rule-based access control mechanism associated with files and/or directories?
A. EFS
B. FACL
C. FIM
D. NTFS
Correct Answer
B. FACL
Question 529
Exam Question
Which of the following access control models enforces the strictest set of access rules?
A. MAC
B. RBAC
C. DAC
D. ABAC
Correct Answer
A. MAC
Question 530
Exam Question
Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model? (Select 3 answers)
A. Users are not allowed to change access policies at their own discretion
B. Labels and clearance levels can only be applied and changed by an administrator
C. Every object has an owner who at his/her own discretion determines what kind of permissions other users can have to that object
D. Access to resources based on user identity
E. Every resource has a sensitivity label matching a clearance level assigned to a user
Correct Answer
A. Users are not allowed to change access policies at their own discretion
B. Labels and clearance levels can only be applied and changed by an administrator
E. Every resource has a sensitivity label matching a clearance level assigned to a user