The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 641
- Exam Question
- Correct Answer
- Question 642
- Exam Question
- Correct Answer
- Question 643
- Exam Question
- Correct Answer
- Question 644
- Exam Question
- Correct Answer
- Question 645
- Exam Question
- Correct Answer
- Question 646
- Exam Question
- Correct Answer
- Question 647
- Exam Question
- Correct Answer
- Question 648
- Exam Question
- Correct Answer
- Question 649
- Exam Question
- Correct Answer
- Question 650
- Exam Question
- Correct Answer
Question 641
Exam Question
The term “Blockchain” refers to a decentralized digital ledger system (i.e. a specific type of a distributed database) stored across multiple computers in a P2P network.
A. True
B. False
Correct Answer
A. True
Question 642
Exam Question
An asymmetric encryption key designed to be used only for a single session or transaction is known as:
A. Static key
B. Ephemeral key
C. Asymmetric key
D. Symmetric key
Correct Answer
B. Ephemeral key
Question 643
Exam Question
An emerging field of advanced computing technologies based on the principles of physics is known as:
A. DNA computing
B. Edge computing
C. Quantum computing
D. Fog computing
Correct Answer
C. Quantum computing
Question 644
Exam Question
What are the characteristic features of Elliptic Curve Cryptography (ECC)? (Select 3 answers)
A. Asymmetric encryption
B. Low processing power requirements
C. Suitable for small wireless devices
D. High processing power requirements
E. Symmetric encryption
F. Not suitable for small wireless devices
Correct Answer
A. Asymmetric encryption
B. Low processing power requirements
C. Suitable for small wireless devices
Question 645
Exam Question
Which of the following answers refers to a type of additional input that increases password complexity and provides better protection against brute-force, dictionary, and rainbow table attacks?
A. Seed
B. IV
C. Salt
D. Shim
Correct Answer
C. Salt
Question 646
Exam Question
In cryptography, the term “Key stretching” refers to a mechanism for extending the length of a cryptographic key to make it more secure against brute-force attacks.
A. True
B. False
Correct Answer
A. True
Question 647
Exam Question
Digital signatures provide: (Select 3 answers)
A. Integrity
B. Authentication
C. Confidentiality
D. Authorization
E. Non-repudiation
F. Accounting
Correct Answer
A. Integrity
B. Authentication
E. Non-repudiation
Question 648
Exam Question
Which of the following methods provides the most effective way for permanent removal of data stored on a magnetic drive?
A. Standard format
B. Overwriting data
C. Degaussing
D. Low-level format
Correct Answer
C. Degaussing
Question 649
Exam Question
Setting up hot and cold aisles in a server room allows for more efficient management of air flow.
A. True
B. False
Correct Answer
A. True
Question 650
Exam Question
Which of the physical security control types listed below provides isolation from external computer networks?
A. Air gap
B. Network segmentation
C. Hardware firewall
D. Protected cable distribution
Correct Answer
A. Air gap