The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 761
- Exam Question
- Correct Answer
- Question 762
- Exam Question
- Correct Answer
- Question 763
- Exam Question
- Correct Answer
- Question 764
- Exam Question
- Correct Answer
- Question 765
- Exam Question
- Correct Answer
- Question 766
- Exam Question
- Correct Answer
- Question 767
- Exam Question
- Correct Answer
- Question 768
- Exam Question
- Correct Answer
- Question 769
- Exam Question
- Correct Answer
- Question 770
- Exam Question
- Correct Answer
Question 761
Exam Question
An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as:
A. Replay attack
B. Brute-force attack
C. Dictionary attack
D. Birthday attack
Correct Answer
B. Brute-force attack
Question 762
Exam Question
Which password attack takes advantage of a predefined list of words?
A. Birthday attack
B. Replay attack
C. Dictionary attack
D. Brute-force attack
Correct Answer
C. Dictionary attack
Question 763
Exam Question
A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:
A. Replay attack
B. Dictionary attack
C. Spraying attack
D. Birthday attack
Correct Answer
C. Spraying attack
Question 764
Exam Question
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
A. Rootkit
B. Spyware
C. Backdoor
D. Trojan
Correct Answer
A. Rootkit
Question 765
Exam Question
Which of the following is an example of spyware?
A. Keylogger
B. Vulnerability scanner
C. Computer worm
D. Packet sniffer
Correct Answer
A. Keylogger
Question 766
Exam Question
Malicious code activated by a specific event is called:
A. Spyware
B. Backdoor
C. Rootkit
D. Logic bomb
Correct Answer
D. Logic bomb
Question 767
Exam Question
Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
A. Botnet
B. Intranet
C. Honeynet
D. Extranet
Correct Answer
A. Botnet
Question 768
Exam Question
What is the function of a C2 server?
A. Spam distribution
B. Botnet control
C. Authentication, Authorization, and Accounting (AAA)
D. Penetration testing
Correct Answer
B. Botnet control
Question 769
Exam Question
What is a PUP? (Select 3 answers)
A. A type of computer program not explicitly classified as malware by AV software
B. An application downloaded and installed without the user’s consent (illegal app)
C. A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
D. An application downloaded and installed with the user’s consent (legal app)
E. A type of computer program explicitly classified as malware by AV applications
F. A type of free, utility software often bundled with a paid app
Correct Answer
A. A type of computer program not explicitly classified as malware by AV software
C. A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
D. An application downloaded and installed with the user’s consent (legal app)
Question 770
Exam Question
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
A. True
B. False
Correct Answer
A. True