The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 721
- Exam Question
- Correct Answer
- Question 722
- Exam Question
- Correct Answer
- Question 723
- Exam Question
- Correct Answer
- Question 724
- Exam Question
- Correct Answer
- Question 725
- Exam Question
- Correct Answer
- Question 726
- Exam Question
- Correct Answer
- Question 727
- Exam Question
- Correct Answer
- Question 728
- Exam Question
- Correct Answer
- Question 729
- Exam Question
- Correct Answer
- Question 730
- Exam Question
- Correct Answer
Question 721
Exam Question
In IT security, the term “Shadow IT” is used to describe software and hardware used within an organization, but outside of the organization’s official IT infrastructure.
A. True
B. False
Correct Answer
A. True
Question 722
Exam Question
Which of the following terms falls into the category of unauthorized hacking activities?
A. Gray hat
B. White hat
C. Black hat
D. Blue hat
Correct Answer
C. Black hat
Question 723
Exam Question
Which of the following terms best describes threat actors whose sole intent behind breaking into a computer system or network is monetary gain?
A. State actors
B. Black hat hackers
C. Criminal syndicates
D. Advanced Persistent Threat (APT)
Correct Answer
C. Criminal syndicates
Question 724
Exam Question
A person who breaks into a computer network or system for a politically or socially motivated purpose is usually described as a(n):
A. Insider
B. Gray hat hacker
C. Hacktivist
D. State actor
Correct Answer
C. Hacktivist
Question 725
Exam Question
Which term best describes a disgruntled employee abusing legitimate access to company’s internal resources?
A. Script kiddie
B. Insider threat
C. Hacktivist
D. Blue hat hacker
Correct Answer
B. Insider threat
Question 726
Exam Question
Files with this filename extension are used in a scripting language based on the Microsoft’s Visual Basic programming language.
A. .vb
B. .sh
C. .vbs
D. .js
Correct Answer
C. .vbs
Question 727
Exam Question
Which of the following answers refers to a script file type designed to be run in Unix command line?
A. bat
B. ps1
C. vbs
D. sh
Correct Answer
D. sh
Question 728
Exam Question
Which of the following answers lists the filename extension of a Microsoft PowerShell script file?
A. .py
B. .vbs
C. .sh
D. .ps1
Correct Answer
D. .ps1
Question 729
Exam Question
What is the most common form of a DDoS attack?
A. IoT-based
B. Network-based
C. OT-based
D. Application-based
Correct Answer
B. Network-based
Question 730
Exam Question
Which of the following factors has the biggest impact on domain reputation?
A. Domain age
B. Missing SSL certificate
C. Derivative content
D. Bounce rate
E. Distribution of spam
Correct Answer
E. Distribution of spam