The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 731
- Exam Question
- Correct Answer
- Question 732
- Exam Question
- Correct Answer
- Question 733
- Exam Question
- Correct Answer
- Question 734
- Exam Question
- Correct Answer
- Question 735
- Exam Question
- Correct Answer
- Question 736
- Exam Question
- Correct Answer
- Question 737
- Exam Question
- Correct Answer
- Question 738
- Exam Question
- Correct Answer
- Question 739
- Exam Question
- Correct Answer
- Question 740
- Exam Question
- Correct Answer
Question 731
Exam Question
URL redirection is a characteristic feature of:
A. Pharming
B. Directory traversal attacks
C. On-path attacks
D. Typosquatting
Correct Answer
A. Pharming
Question 732
Exam Question
The term “Domain hijacking” refers to a situation in which domain registrants due to unlawful actions of third parties lose control over their domain names.
A. True
B. False
Correct Answer
A. True
Question 733
Exam Question
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)
A. ARP poisoning
B. On-path attack
C. MAC spoofing
D. Replay attack
E. MAC cloning
Correct Answer
C. MAC spoofing
E. MAC cloning
Question 734
Exam Question
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?
A. ARP poisoning
B. Replay attack
C. Cross-site request forgery
D. DNS poisoning
Correct Answer
A. ARP poisoning
Question 735
Exam Question
Which of the following provide randomization during encryption process? (Select 2 answers)
A. Salting
B. Rainbow tables
C. Obfuscation
D. Initialization Vector (IV)
E. Shimming
Correct Answer
A. Salting
D. Initialization Vector (IV)
Question 736
Exam Question
What is the name of a technology used for contactless payment transactions?
A. NFC
B. SDN
C. PED
D. WAP
Correct Answer
A. NFC
Question 737
Exam Question
A type of identification badge that can be held within a certain distance of a reader device to authenticate its holder is called:
A. Smart card
B. ID badge
C. Soft token
D. RFID badge
Correct Answer
D. RFID badge
Question 738
Exam Question
A wireless jamming attack is a type of:
A. Cryptographic attack
B. Denial-of-Service (DoS) attack
C. Brute-force attack
D. Downgrade attack
Correct Answer
B. Denial-of-Service (DoS) attack
Question 739
Exam Question
The practice of sending unsolicited messages over Bluetooth is known as:
A. SPIM
B. Bluejacking
C. Vishing
D. Bluesnarfing
Correct Answer
B. Bluejacking
Question 740
Exam Question
The term “Evil twin” refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.
A. True
B. False
Correct Answer
A. True