Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 6

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 581

Exam Question

Which of the following wireless encryption schemes offers the highest level of protection?

A. WEP
B. WPA3
C. WAP
D. WPA
E. WPA2

Correct Answer

B. WPA3

Question 582

Exam Question

Which of the following allows an administrator to inspect traffic passing through a network switch?

A. VLAN tagging
B. Port mirroring
C. Fault-tolerant mode
D. Port scanner

Correct Answer

B. Port mirroring

Question 583

Exam Question

A rule-based access control mechanism implemented on routers, switches, and firewalls is called:

A. ACL
B. CSR
C. DLP
D. AUP

Correct Answer

A. ACL

Question 584

Exam Question

Examples of application software designed to selectively block access to websites include: (Select 2 answers)

A. URL filter
B. Captive portal
C. Firewall
D. Content filter
E. Proxy server

Correct Answer

A. URL filter
D. Content filter

Question 585

Exam Question

A solution that alleviates the problem of depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address is known as:

A. DNS
B. APIPA
C. NAT
D. DHCP

Correct Answer

C. NAT

Question 586

Exam Question

Stateless inspection is a firewall technology that keeps track of the state of network connections and based on that data determines which network packets to allow through the firewall.

A. True
B. False

Correct Answer

B. False

Question 587

Exam Question

Which of the acronyms listed below refers to a firewall controlling access to a web server?

A. WEP
B. WAP
C. WPS
D. WAF

Correct Answer

D. WAF

Question 588

Exam Question

A security administrator configured a NIDS to receive traffic from network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the NIDS? (Select 2 answers)

A. In-band
B. Passive
C. Inline
D. Out-of-band

Correct Answer

B. Passive
D. Out-of-band

Question 589

Exam Question

A type of NIDS/NIPS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based NIDS/NIPS.

A. True
B. False

Correct Answer

A. True

Question 590

Exam Question

What are the characteristic features of a transparent proxy? (Select all that apply)

A. Doesn’t require client-side configuration
B. Modifies client’s requests and responses
C. Redirects client’s requests and responses without modifying them
D. Clients might be unaware of the proxy service
E. Requires client-side configuration

Correct Answer

A. Doesn’t require client-side configuration
C. Redirects client’s requests and responses without modifying them
D. Clients might be unaware of the proxy service

    Ads Blocker Image Powered by Code Help Pro

    Ads Blocker Detected!!!

    This site depends on revenue from ad impressions to survive. If you find this site valuable, please consider disabling your ad blocker.