Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 8 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 731

Exam Question

URL redirection is a characteristic feature of:

A. Pharming
B. Directory traversal attacks
C. On-path attacks
D. Typosquatting

Correct Answer

A. Pharming

Question 732

Exam Question

The term “Domain hijacking” refers to a situation in which domain registrants due to unlawful actions of third parties lose control over their domain names.

A. True
B. False

Correct Answer

A. True

Question 733

Exam Question

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)

A. ARP poisoning
B. On-path attack
C. MAC spoofing
D. Replay attack
E. MAC cloning

Correct Answer

C. MAC spoofing
E. MAC cloning

Question 734

Exam Question

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?

A. ARP poisoning
B. Replay attack
C. Cross-site request forgery
D. DNS poisoning

Correct Answer

A. ARP poisoning

Question 735

Exam Question

Which of the following provide randomization during encryption process? (Select 2 answers)

A. Salting
B. Rainbow tables
C. Obfuscation
D. Initialization Vector (IV)
E. Shimming

Correct Answer

A. Salting
D. Initialization Vector (IV)

Question 736

Exam Question

What is the name of a technology used for contactless payment transactions?

A. NFC
B. SDN
C. PED
D. WAP

Correct Answer

A. NFC

Question 737

Exam Question

A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:

A. Smart card
B. ID badge
C. Soft token
D. RFID badge

Correct Answer

D. RFID badge

Question 738

Exam Question

A wireless jamming attack is a type of:

A. Cryptographic attack
B. Denial-of-Service (DoS) attack
C. Brute-force attack
D. Downgrade attack

Correct Answer

B. Denial-of-Service (DoS) attack

Question 739

Exam Question

The practice of sending unsolicited messages over Bluetooth is known as:

A. SPIM
B. Bluejacking
C. Vishing
D. Bluesnarfing

Correct Answer

B. Bluejacking

Question 740

Exam Question

The term “Evil twin” refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.

A. True
B. False

Correct Answer

A. True