The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 671
- Exam Question
- Correct Answer
- Question 672
- Exam Question
- Correct Answer
- Question 673
- Exam Question
- Correct Answer
- Question 674
- Exam Question
- Correct Answer
- Question 675
- Exam Question
- Correct Answer
- Question 676
- Exam Question
- Correct Answer
- Question 677
- Exam Question
- Correct Answer
- Question 678
- Exam Question
- Correct Answer
- Question 679
- Exam Question
- Correct Answer
- Question 680
- Exam Question
- Correct Answer
Question 671
Exam Question
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
A. Authentication
B. Authorization
C. Accounting
Correct Answer
C. Accounting
Question 672
Exam Question
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
A. Authentication
B. Authorization
C. Accounting
Correct Answer
A. Authentication
Question 673
Exam Question
Examples of MFA attributes include: (Select all that apply)
A. USB token
B. Retina scan
C. Handwritten signature
D. Gait analysis
E. GPS reading
F. PIN
G. Chain of trust
Correct Answer
C. Handwritten signature
D. Gait analysis
E. GPS reading
G. Chain of trust
Question 674
Exam Question
Authentication process can be based on various categories of authentication factors and attributes. Authentication factors include unique physical traits of each individual such as fingerprints (“something you are”), physical tokens such as smart cards (“something you have”), or usernames and passwords (“something you know”). The categories of authentication attributes include geolocation (“somewhere you are”), user-specific activity patterns, such as keyboard typing style (“something you can do”), revealing something about an individual, e.g. wearing an ID badge (“something you exhibit”), or proving the relation with a trusted third party (“someone you know”). Multifactor authentication systems require implementation of authentication factors from two or more distinct categories.
A. True
B. False
Correct Answer
A. True
Question 675
Exam Question
A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is referred to as:
A. FAR
B. CER
C. CRC
D. FRR
Correct Answer
D. FRR
Question 676
Exam Question
Which of the following is not used in the process of biometric authentication?
A. Fingerprint scan
B. Voice recognition
C. Vein analysis
D. Retina / Iris scan
E. Face recognition
F. Gait analysis
G. All of the above can be used in the biometric authentication process
Correct Answer
G. All of the above can be used in the biometric authentication process
Question 677
Exam Question
Which of the following answers refers to an example implementation of certificate-based authentication?
A. Smart card
B. ID badge
C. PIN code
D. Biometric lock
Correct Answer
A. Smart card
Question 678
Exam Question
An authenticator application is a software that generates additional authentication token (in the form of a random code) used in multi-step verification process.
A. True
B. False
Correct Answer
A. True
Question 679
Exam Question
Which of the following is an example of a soft authentication token?
A. USB token
B. Authenticator app
C. Smart card
D. Key fob
Correct Answer
B. Authenticator app
Question 680
Exam Question
Which of the following answers refer to the characteristics of HOTP? (Select 3 answers)
A. Valid for only one login session
B. Based on a shared secret key and current time
C. Vulnerable to replay attacks
D. Based on a cryptographic hash function and a secret cryptographic key
E. Valid for multiple login sessions
F. Not vulnerable to replay attacks
Correct Answer
A. Valid for only one login session
D. Based on a cryptographic hash function and a secret cryptographic key
F. Not vulnerable to replay attacks