The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 701
- Exam Question
- Correct Answer
- Question 702
- Exam Question
- Correct Answer
- Question 703
- Exam Question
- Correct Answer
- Question 704
- Exam Question
- Correct Answer
- Question 705
- Exam Question
- Correct Answer
- Question 706
- Exam Question
- Correct Answer
- Question 707
- Exam Question
- Correct Answer
- Question 708
- Exam Question
- Correct Answer
- Question 709
- Exam Question
- Correct Answer
- Question 710
- Exam Question
- Correct Answer
Question 701
Exam Question
Physical and logical network diagrams provide visual representation of network architecture. A physical network diagram contains information on hardware devices and physical links between them. A logical network diagram describes the actual traffic flow on a network and provides information related to IP addressing schemes, subnets, device roles, or protocols that are in use on the network.
A. True
B. False
Correct Answer
A. True
Question 702
Exam Question
In cybersecurity exercises, the role of an event overseer (i.e. the referee) is delegated to:
A. Red team
B. Blue team
C. White team
D. Purple team
Correct Answer
C. White team
Question 703
Exam Question
In cybersecurity exercises, red team takes on the role of:
A. An attacker
B. A defender
C. Both an attacker and a defender
D. An exercise overseer
Correct Answer
A. An attacker
Question 704
Exam Question
An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
A. War chalking
B. Spoofing
C. War driving
D. Insider threat
Correct Answer
C. War driving
Question 705
Exam Question
In penetration testing, passive reconnaissance relies on gathering information on the targeted system with the use of various non-invasive software tools and techniques, such as pinging, port scanning, or OS fingerprinting.
A. True
B. False
Correct Answer
B. False
Question 706
Exam Question
A penetration test of a computer system performed without the prior knowledge on how the system that is to be tested works is referred to as a black-box testing.
A. True
B. False
Correct Answer
A. True
Question 707
Exam Question
Penetration testing: (Select all that apply)
A. Bypasses security controls
B. Only identifies lack of security controls
C. Actively tests security controls
D. Exploits vulnerabilities
E. Passively tests security controls
Correct Answer
A. Bypasses security controls
C. Actively tests security controls
D. Exploits vulnerabilities
Question 708
Exam Question
A security solution designed to detect anomalies in the log and event data collected from multiple network devices is called:
A. SNMP
B. PCAP
C. HIPS
D. SIEM
Correct Answer
D. SIEM
Question 709
Exam Question
An industry standard for assessing the severity of computer system security vulnerabilities is known as:
A. SIEM
B. CVSS
C. OSINT
D. SOAR
Correct Answer
B. CVSS
Question 710
Exam Question
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:
A. Fault tolerance
B. False positive error
C. Quarantine function
D. False negative error
Correct Answer
B. False positive error