The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 531
- Exam Question
- Correct Answer
- Question 532
- Exam Question
- Correct Answer
- Question 533
- Exam Question
- Correct Answer
- Question 534
- Exam Question
- Correct Answer
- Question 535
- Exam Question
- Correct Answer
- Question 536
- Exam Question
- Correct Answer
- Question 537
- Exam Question
- Correct Answer
- Question 538
- Exam Question
- Correct Answer
- Question 539
- Exam Question
- Correct Answer
- Question 540
- Exam Question
- Correct Answer
Question 531
Exam Question
An access control model in which access to resources is granted or denied depending on the contents of Access Control List (ACL) entries is called:
A. Role-Based Access Control
B. Mandatory Access Control
C. Rule-Based Access Control
D. Lattice-Based Access Control
Correct Answer
C. Rule-Based Access Control
Question 532
Exam Question
Examples of properties used for defining access policies in Attribute-Based Access Control (ABAC) model include:
A. Subject (i.e. user or process requesting access)
B. Type of action (for example “read”, “write”, “execute”)
C. Resource type (medical record, bank account etc.)
D. Environment (contextual data, such as time of day or geolocation)
E. All of the above
Correct Answer
E. All of the above
Question 533
Exam Question
Which protocol ensures the reliability of the Kerberos authentication process?
A. EAP
B. NTP
C. IPsec
D. RTP
Correct Answer
B. NTP
Question 534
Exam Question
Assigning a unique encrypted key, called a ticket, to each user that logs on to the network is a characteristic feature of:
A. SAML
B. TOTP
C. RADIUS
D. Kerberos
Correct Answer
D. Kerberos
Question 535
Exam Question
A common implementation of identity and access controls used in federated SSO systems includes OpenID Connect and Oauth 2.0 used in conjunction to provide authentication and authorization services.
A. True
B. False
Correct Answer
A. True
Question 536
Exam Question
OAuth is an open standard for:
A. Authentication
B. Authorization
C. Accounting
Correct Answer
B. Authorization
Question 537
Exam Question
Which of the answers listed below refers to an XML-based markup language for exchanging authentication and authorization data?
A. SAML
B. OpenID Connect
C. Shibboleth
D. OAuth
Correct Answer
A. SAML
Question 538
Exam Question
What are the characteristic features of RADIUS? (Select 3 answers)
A. Primarily used for network access
B. Encrypts the entire payload of the access-request packet
C. Combines authentication and authorization
D. Encrypts only the password in the access-request packet
E. Primarily used for device administration
F. Separates authentication and authorization
Correct Answer
A. Primarily used for network access
C. Combines authentication and authorization
D. Encrypts only the password in the access-request packet
Question 539
Exam Question
Which of the answers listed below refers to an obsolete authentication protocol that sends passwords in cleartext?
A. PAP
B. CHAP
C. EAP
D. MS-CHAP
Correct Answer
A. PAP
Question 540
Exam Question
The difference between static KBA and dynamic KBA is that in the case of static KBA authentication process relies on pre-determined security questions and answers chosen in advance by the user during the account creation process. On the other hand, setting up dynamic KBA does not require user input, i.e. users are not asked to choose security questions during the account creation process. Instead, dynamic KBA relies on various public and private data sources that pertain to the user which makes it a more secure authentication method.
A. True
B. False
Correct Answer
A. True