Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 8 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 711

Exam Question

The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (such as routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

A. True
B. False

Correct Answer

A. True

Question 712

Exam Question

Which of the following answers refers to a deprecated encryption protocol?

A. SSH
B. TLS
C. S/MIME
D. SSL
E. IPsec
F. PGP

Correct Answer

D. SSL

Question 713

Exam Question

Which of the following describes the behavior of a threat actor?

A. PII
B. TTPs
C. IPS
D. MaaS

Correct Answer

B. TTPs

Question 714

Exam Question

GitHub is an example of:

A. Digital media store
B. Virtualization software
C. File/code repository
D. Social media site

Correct Answer

C. File/code repository

Question 715

Exam Question

What is STIX?

A. Vulnerability database
B. Common language for describing cyber threat information
C. US government initiative for real-time sharing of cyber threat indicators
D. Transport mechanism for cyber threat information

Correct Answer

B. Common language for describing cyber threat information

Question 716

Exam Question

A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:

A. CVE
B. IoC
C. AIS
D. OSINT

Correct Answer

B. IoC

Question 717

Exam Question

Which of the following answers refer to vulnerability databases? (Select 2 answers)

A. DBA
B. CVE
C. DBaaS
D. NVD
E. AIS

Correct Answer

B. CVE
D. NVD

Question 718

Exam Question

Examples of social media threat vectors include:

A. PII harvesting
B. Social engineering
C. Identity/account theft
D. Malicious URLs
E. All of the above

Correct Answer

E. All of the above

Question 719

Exam Question

Which of the following answers does not refer to an email communication threat vector?

A. Skimming
B. Malicious attachment
C. Social engineering
D. Malicious URL
E. Phishing

Correct Answer

A. Skimming

Question 720

Exam Question

Which of the following answers does not relate to a direct access threat vector?

A. Malicious USB cable
B. Backdoor
C. Malicious URL
D. Lack of physical security controls
E. Malicious flash drive

Correct Answer

C. Malicious URL