The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 711
- Exam Question
- Correct Answer
- Question 712
- Exam Question
- Correct Answer
- Question 713
- Exam Question
- Correct Answer
- Question 714
- Exam Question
- Correct Answer
- Question 715
- Exam Question
- Correct Answer
- Question 716
- Exam Question
- Correct Answer
- Question 717
- Exam Question
- Correct Answer
- Question 718
- Exam Question
- Correct Answer
- Question 719
- Exam Question
- Correct Answer
- Question 720
- Exam Question
- Correct Answer
Question 711
Exam Question
The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (such as routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.
A. True
B. False
Correct Answer
A. True
Question 712
Exam Question
Which of the following answers refers to a deprecated encryption protocol?
A. SSH
B. TLS
C. S/MIME
D. SSL
E. IPsec
F. PGP
Correct Answer
D. SSL
Question 713
Exam Question
Which of the following describes the behavior of a threat actor?
A. PII
B. TTPs
C. IPS
D. MaaS
Correct Answer
B. TTPs
Question 714
Exam Question
GitHub is an example of:
A. Digital media store
B. Virtualization software
C. File/code repository
D. Social media site
Correct Answer
C. File/code repository
Question 715
Exam Question
What is STIX?
A. Vulnerability database
B. Common language for describing cyber threat information
C. US government initiative for real-time sharing of cyber threat indicators
D. Transport mechanism for cyber threat information
Correct Answer
B. Common language for describing cyber threat information
Question 716
Exam Question
A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:
A. CVE
B. IoC
C. AIS
D. OSINT
Correct Answer
B. IoC
Question 717
Exam Question
Which of the following answers refer to vulnerability databases? (Select 2 answers)
A. DBA
B. CVE
C. DBaaS
D. NVD
E. AIS
Correct Answer
B. CVE
D. NVD
Question 718
Exam Question
Examples of social media threat vectors include:
A. PII harvesting
B. Social engineering
C. Identity/account theft
D. Malicious URLs
E. All of the above
Correct Answer
E. All of the above
Question 719
Exam Question
Which of the following answers does not refer to an email communication threat vector?
A. Skimming
B. Malicious attachment
C. Social engineering
D. Malicious URL
E. Phishing
Correct Answer
A. Skimming
Question 720
Exam Question
Which of the following answers does not relate to a direct access threat vector?
A. Malicious USB cable
B. Backdoor
C. Malicious URL
D. Lack of physical security controls
E. Malicious flash drive
Correct Answer
C. Malicious URL