Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 7 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 631

Exam Question

A suite of security extensions for an Internet service that translates domain names into IP addresses is known as:

A. EDNS
B. DNSSEC
C. Split DNS
D. DDNS

Correct Answer

B. DNSSEC

Question 632

Exam Question

Which of the following terms applies to the concept of non-repudiation?

A. Security through obscurity
B. Digital certificate
C. MFA
D. Hashing
E. Encryption

Correct Answer

B. Digital certificate

Question 633

Exam Question

Which of the following terms applies to the concept of obfuscation?

A. Encryption
B. Security through obscurity
C. Hashing
D. Digital certificate
E. MFA

Correct Answer

B. Security through obscurity

Question 634

Exam Question

Which of the following terms applies to the concept of confidentiality?

A. Hashing
B. Encryption
C. Security through obscurity
D. MFA
E. Digital certificate

Correct Answer

B. Encryption

Question 635

Exam Question

Which of the following enables processing data in an encrypted form?

A. Diffusion
B. Homomorphic encryption
C. Obfuscation
D. Hashing

Correct Answer

B. Homomorphic encryption

Question 636

Exam Question

Which of the following terms illustrate the security through obscurity concept? (Select all that apply)

A. Code obfuscation
B. Steganography
C. SSID broadcast suppression
D. Encryption

Correct Answer

A. Code obfuscation
B. Steganography
C. SSID broadcast suppression

Question 637

Exam Question

Which of the algorithms listed below does not belong to the category of symmetric ciphers?

A. RC4
B. DES
C. RSA
D. AES
E. Blowfish
F. 3DES
G. Twofish

Correct Answer

C. RSA

Question 638

Exam Question

Symmetric encryption algorithms require large amounts of processing power for both encryption and decryption of data which makes them much slower in comparison to asymmetric encryption ciphers.

A. True
B. False

Correct Answer

B. False

Question 639

Exam Question

Examples of techniques used for encrypting information include symmetric encryption (also called public-key encryption) and asymmetric encryption (also called secret-key encryption, or session-key encryption.)

A. True
B. False

Correct Answer

B. False

Question 640

Exam Question

Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use?

A. CBC
B. GCM
C. ECB
D. CTR

Correct Answer

C. ECB