The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Question 581
Exam Question
Which of the following wireless encryption schemes offers the highest level of protection?
A. WEP
B. WPA3
C. WAP
D. WPA
E. WPA2
Correct Answer
B. WPA3
Question 582
Exam Question
Which of the following allows an administrator to inspect traffic passing through a network switch?
A. VLAN tagging
B. Port mirroring
C. Fault-tolerant mode
D. Port scanner
Correct Answer
B. Port mirroring
Question 583
Exam Question
A rule-based access control mechanism implemented on routers, switches, and firewalls is called:
A. ACL
B. CSR
C. DLP
D. AUP
Correct Answer
A. ACL
Question 584
Exam Question
Examples of application software designed to selectively block access to websites include: (Select 2 answers)
A. URL filter
B. Captive portal
C. Firewall
D. Content filter
E. Proxy server
Correct Answer
A. URL filter
D. Content filter
Question 585
Exam Question
A solution that alleviates the problem of depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address is known as:
A. DNS
B. APIPA
C. NAT
D. DHCP
Correct Answer
C. NAT
Question 586
Exam Question
Stateless inspection is a firewall technology that keeps track of the state of network connections and based on that data determines which network packets to allow through the firewall.
A. True
B. False
Correct Answer
B. False
Question 587
Exam Question
Which of the acronyms listed below refers to a firewall controlling access to a web server?
A. WEP
B. WAP
C. WPS
D. WAF
Correct Answer
D. WAF
Question 588
Exam Question
A security administrator configured a NIDS to receive traffic from network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the NIDS? (Select 2 answers)
A. In-band
B. Passive
C. Inline
D. Out-of-band
Correct Answer
B. Passive
D. Out-of-band
Question 589
Exam Question
A type of NIDS/NIPS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based NIDS/NIPS.
A. True
B. False
Correct Answer
A. True
Question 590
Exam Question
What are the characteristic features of a transparent proxy? (Select all that apply)
A. Doesn’t require client-side configuration
B. Modifies client’s requests and responses
C. Redirects client’s requests and responses without modifying them
D. Clients might be unaware of the proxy service
E. Requires client-side configuration
Correct Answer
A. Doesn’t require client-side configuration
C. Redirects client’s requests and responses without modifying them
D. Clients might be unaware of the proxy service