Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 7 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 671

Exam Question

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

A. Authentication
B. Authorization
C. Accounting

Correct Answer

C. Accounting

Question 672

Exam Question

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

A. Authentication
B. Authorization
C. Accounting

Correct Answer

A. Authentication

Question 673

Exam Question

Examples of MFA attributes include: (Select all that apply)

A. USB token
B. Retina scan
C. Handwritten signature
D. Gait analysis
E. GPS reading
F. PIN
G. Chain of trust

Correct Answer

C. Handwritten signature
D. Gait analysis
E. GPS reading
G. Chain of trust

Question 674

Exam Question

Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints (“something you are”), physical tokens such as smart cards (“something you have”), or usernames and passwords (“something you know”). The categories of authentication attributes include geolocation (“somewhere you are”), user-specific activity patterns, such as keyboard typing style (“something you can do”), revealing something about an individual, e.g. wearing an ID badge (“something you exhibit”), or proving the relation with a trusted third party (“someone you know”). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.

A. True
B. False

Correct Answer

A. True

Question 675

Exam Question

A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is referred to as:

A. FAR
B. CER
C. CRC
D. FRR

Correct Answer

D. FRR

Question 676

Exam Question

Which of the following is not used in the process of biometric authentication?

A. Fingerprint scan
B. Voice recognition
C. Vein analysis
D. Retina / Iris scan
E. Face recognition
F. Gait analysis
G. All of the above can be used in the biometric authentication process

Correct Answer

G. All of the above can be used in the biometric authentication process

Question 677

Exam Question

Which of the following answers refers to an example implementation of certificate-based authentication?

A. Smart card
B. ID badge
C. PIN code
D. Biometric lock

Correct Answer

A. Smart card

Question 678

Exam Question

An authenticator application is a software that generates additional authentication token (in the form of a random code) used in multi-step verification process.

A. True
B. False

Correct Answer

A. True

Question 679

Exam Question

Which of the following is an example of a soft authentication token?

A. USB token
B. Authenticator app
C. Smart card
D. Key fob

Correct Answer

B. Authenticator app

Question 680

Exam Question

Which of the following answers refer to the characteristics of HOTP? (Select 3 answers)

A. Valid for only one login session
B. Based on a shared secret key and current time
C. Vulnerable to replay attacks
D. Based on a cryptographic hash function and a secret cryptographic key
E. Valid for multiple login sessions
F. Not vulnerable to replay attacks

Correct Answer

A. Valid for only one login session
D. Based on a cryptographic hash function and a secret cryptographic key
F. Not vulnerable to replay attacks