Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 7 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 681

Exam Question

An authentication subsystem in which a single set of authentication credentials provides access to multiple systems across different organizations is called:

A. AAA framework
B. Multi-factor authentication
C. Group-based access control
D. Federation

Correct Answer

D. Federation

Question 682

Exam Question

A type of code that has already been translated from a high-level programming language into a low-level programming language and converted into a binary executable file is referred to as:

A. Script code
B. Compiled code
C. Inline code
D. Runtime code

Correct Answer

B. Compiled code

Question 683

Exam Question

Which of the acronyms listed below refers to a specialized suite of software tools used for developing applications for a specific platform?

A. GUI
B. SDLC
C. API
D. SDK

Correct Answer

D. SDK

Question 684

Exam Question

In web application programming, the term “Backend” typically refers to the part of a computer system or application that is not directly accessed by the user (for example a web server). On the opposite side, “Frontend” means software that can be accessed by the user locally (an example of this would be user’s web browser). Code execution and input validation that take place in the backend are referred to as server-side operations, the frontend equivalent of this is known as client-side operations.

A. True
B. False

Correct Answer

A. True

Question 685

Exam Question

Code obfuscation techniques rely on encryption to protect the source code against unauthorized access.

A. True
B. False

Correct Answer

B. False

Question 686

Exam Question

The process of removing redundant entries from a database is known as:

A. Normalization
B. Input validation
C. Baselining
D. Data sanitization

Correct Answer

A. Normalization

Question 687

Exam Question

What are the countermeasures against VM escape? (Select 2 answers)

A. Group policy
B. Sandboxing
C. User training
D. Patch management
E. Asset documentation

Correct Answer

B. Sandboxing
D. Patch management

Question 688

Exam Question

The term “VM escape” refers to the process of breaking out of the boundaries of a guest operating system installation to access the primary hypervisor controlling all the virtual machines on the host machine.

A. True
B. False

Correct Answer

A. True

Question 689

Exam Question

In cloud computing, users on an on-premises network take advantage of a transit gateway to connect to:

A. WAN
B. VPC
C. SAN
D. VLAN

Correct Answer

B. VPC

Question 690

Exam Question

In software engineering, the term “Microservice” describes independent and self-contained code components that can be put together to form an application.

A. True
B. False

Correct Answer

A. True