Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 6 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 521

Exam Question

Which of the following answers refer to the P7B digital certificate format? (Select 3 answers)

A. Encoded in text (ASCII Base64) format
B. .p7b file extension
C. Generally used for Microsoft windows and Java Tomcat servers
D. Encoded in binary format
E. .der and .cer file extensions
F. Generally used for Apache servers or similar configurations

Correct Answer

A. Encoded in text (ASCII Base64) format
B. .p7b file extension
C. Generally used for Microsoft windows and Java Tomcat servers

Question 522

Exam Question

Which of the following answers refer to the Privacy Enhanced Email (PEM) digital certificate format? (Select 3 answers)

A. Encoded in binary format
B. .pfx and .p12 file extensions
C. Generally used for Java servers
D. Encoded in text (ASCII Base64) format
E. .pem, .crt, .cer and .key file extensions
F. Generally used for Apache servers or similar configurations

Correct Answer

D. Encoded in text (ASCII Base64) format
E. .pem, .crt, .cer and .key file extensions
F. Generally used for Apache servers or similar configurations

Question 523

Exam Question

Code-signing certificates are used to verify the authenticity and integrity of software. Self-signed certificates have a lower level of trustworthiness, because they are not signed by a Certificate Authority (CA). Computer certificates (a.k.a. machine certificates) are used to prove the identity of devices. S/MIME certificates are used to encrypt and digitally sign email messages. User digital certificates provide improved security during authentication and authorization of individuals. Root certificates are self-signed certificates that identify a root Certificate Authority (CA). Domain validation certificates prove a user’s ownership rights to a domain. Extended Validation (EV) certificates provide the highest level of trust and protection.

A. True
B. False

Correct Answer

A. True

Question 524

Exam Question

Which digital certificate type allows multiple subdomains to be protected by a single certificate?

A. Root signing certificate
B. Subject Alternative Name (SAN) certificate
C. Extended Validation (EV) certificate
D. Wildcard certificate

Correct Answer

D. Wildcard certificate

Question 525

Exam Question

Which of the answers listed below refers to a method for requesting a digital certificate?

A. CBC
B. CSR
C. CFB
D. CRL

Correct Answer

B. CSR

Question 526

Exam Question

Which of the following solutions allow to check whether a digital certificate has been revoked? (Select 2 answers)

A. CIRT
B. CRL
C. OCSP
D. CSR
E. Key escrow

Correct Answer

B. CRL
C. OCSP

Question 527

Exam Question

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

A. RA
B. IKE
C. CA
D. CSP

Correct Answer

C. CA

Question 528

Exam Question

Which of the following answers refers to a rule-based access control mechanism associated with files and/or directories?

A. EFS
B. FACL
C. FIM
D. NTFS

Correct Answer

B. FACL

Question 529

Exam Question

Which of the following access control models enforces the strictest set of access rules?

A. MAC
B. RBAC
C. DAC
D. ABAC

Correct Answer

A. MAC

Question 530

Exam Question

Which of the following answers list the characteristic features of the Mandatory Access Control (MAC) model? (Select 3 answers)

A. Users are not allowed to change access policies at their own discretion
B. Labels and clearance levels can only be applied and changed by an administrator
C. Every object has an owner who at his/her own discretion determines what kind of permissions other users can have to that object
D. Access to resources based on user identity
E. Every resource has a sensitivity label matching a clearance level assigned to a user

Correct Answer

A. Users are not allowed to change access policies at their own discretion
B. Labels and clearance levels can only be applied and changed by an administrator
E. Every resource has a sensitivity label matching a clearance level assigned to a user