Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 8 Part 2

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 761

Exam Question

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as:

A. Replay attack
B. Brute-force attack
C. Dictionary attack
D. Birthday attack

Correct Answer

B. Brute-force attack

Question 762

Exam Question

Which password attack takes advantage of a predefined list of words?

A. Birthday attack
B. Replay attack
C. Dictionary attack
D. Brute-force attack

Correct Answer

C. Dictionary attack

Question 763

Exam Question

A short list of commonly used passwords tried against large number of user accounts is a characteristic feature of:

A. Replay attack
B. Dictionary attack
C. Spraying attack
D. Birthday attack

Correct Answer

C. Spraying attack

Question 764

Exam Question

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A. Rootkit
B. Spyware
C. Backdoor
D. Trojan

Correct Answer

A. Rootkit

Question 765

Exam Question

Which of the following is an example of spyware?

A. Keylogger
B. Vulnerability scanner
C. Computer worm
D. Packet sniffer

Correct Answer

A. Keylogger

Question 766

Exam Question

Malicious code activated by a specific event is called:

A. Spyware
B. Backdoor
C. Rootkit
D. Logic bomb

Correct Answer

D. Logic bomb

Question 767

Exam Question

Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?

A. Botnet
B. Intranet
C. Honeynet
D. Extranet

Correct Answer

A. Botnet

Question 768

Exam Question

What is the function of a C2 server?

A. Spam distribution
B. Botnet control
C. Authentication, Authorization, and Accounting (AAA)
D. Penetration testing

Correct Answer

B. Botnet control

Question 769

Exam Question

What is a PUP? (Select 3 answers)

A. A type of computer program not explicitly classified as malware by AV software
B. An application downloaded and installed without the user’s consent (illegal app)
C. A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
D. An application downloaded and installed with the user’s consent (legal app)
E. A type of computer program explicitly classified as malware by AV applications
F. A type of free, utility software often bundled with a paid app

Correct Answer

A. A type of computer program not explicitly classified as malware by AV software
C. A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
D. An application downloaded and installed with the user’s consent (legal app)

Question 770

Exam Question

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.

A. True
B. False

Correct Answer

A. True