Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 6 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 531

Exam Question

An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries is called:

A. Role-Based Access Control
B. Mandatory Access Control
C. Rule-Based Access Control
D. Lattice-Based Access Control

Correct Answer

C. Rule-Based Access Control

Question 532

Exam Question

Examples of properties used for defining access policies in Attribute-Based Access Control (ABAC) model include:

A. Subject (i.e. user or process requesting access)
B. Type of action (for example “read”, “write”, “execute”)
C. Resource type (medical record, bank account etc.)
D. Environment (contextual data, such as time of day or geolocation)
E. All of the above

Correct Answer

E. All of the above

Question 533

Exam Question

Which protocol ensures the reliability of the Kerberos authentication process?

A. EAP
B. NTP
C. IPsec
D. RTP

Correct Answer

B. NTP

Question 534

Exam Question

Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of:

A. SAML
B. TOTP
C. RADIUS
D. Kerberos

Correct Answer

D. Kerberos

Question 535

Exam Question

A common implementation of identity and access controls used in federated SSO systems includes OpenID Connect and Oauth 2.0 used in conjunction to provide authentication and authorization services.

A. True
B. False

Correct Answer

A. True

Question 536

Exam Question

OAuth is an open standard for:

A. Authentication
B. Authorization
C. Accounting

Correct Answer

B. Authorization

Question 537

Exam Question

Which of the answers listed below refers to an XML-based markup language for exchanging authentication and authorization data?

A. SAML
B. OpenID Connect
C. Shibboleth
D. OAuth

Correct Answer

A. SAML

Question 538

Exam Question

What are the characteristic features of RADIUS? (Select 3 answers)

A. Primarily used for network access
B. Encrypts the entire payload of the access-request packet
C. Combines authentication and authorization
D. Encrypts only the password in the access-request packet
E. Primarily used for device administration
F. Separates authentication and authorization

Correct Answer

A. Primarily used for network access
C. Combines authentication and authorization
D. Encrypts only the password in the access-request packet

Question 539

Exam Question

Which of the answers listed below refers to an obsolete authentication protocol that sends passwords in cleartext?

A. PAP
B. CHAP
C. EAP
D. MS-CHAP

Correct Answer

A. PAP

Question 540

Exam Question

The difference between static KBA and dynamic KBA is that in the case of static KBA authentication process relies on pre-determined security questions and answers chosen in advance by the user during the account creation process. On the other hand, setting up dynamic KBA does not require user input, i.e. users are not asked to choose security questions during the account creation process. Instead, dynamic KBA relies on various public and private data sources that pertain to the user which makes it a more secure authentication method.

A. True
B. False

Correct Answer

A. True