Skip to Content

CompTIA Security+ SY0-601 Exam Questions and Answers – Page 8 Part 1

The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.

CompTIA Security+ (SY0-601) Exam Questions and Answers

Question 741

Exam Question

Which of the following terms refer to software/hardware driver manipulation techniques? (Select 2 answers)

A. Prepending
B. Fuzz testing
C. Refactoring
D. Shimming
E. Sideloading

Correct Answer

C. Refactoring
D. Shimming

Question 742

Exam Question

Which of the following alters the external behavior of an application and at the same time does not introduce any changes to the application’s code?

A. Shimming
B. Refactoring
C. API call
D. Sideloading

Correct Answer

A. Shimming

Question 743

Exam Question

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required is known as:

A. Memory leak
B. Buffer overflow
C. Race condition
D. Integer overflow

Correct Answer

A. Memory leak

Question 744

Exam Question

Which of the following enables the exchange of information between computer programs?

A. API
B. UI
C. Device drivers
D. SDK

Correct Answer

A. API

Question 745

Exam Question

Which type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions?

A. XSRF
B. CSRF
C. XSS
D. SSRF

Correct Answer

D. SSRF

Question 746

Exam Question

In a session replay attack, an attacker steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access or tricking the server into unauthorized operations.

A. True
B. False

Correct Answer

A. True

Question 747

Exam Question

A network replay attack occurs when an attacker intercepts sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.

A. True
B. False

Correct Answer

A. True

Question 748

Exam Question

A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:

A. Zero-day vulnerability
B. Improper input validation
C. Default configuration
D. Improper error handling

Correct Answer

B. Improper input validation

Question 749

Exam Question

Which of the following terms refers to a vulnerability caused by race conditions?

A. Mean time to failure
B. Replay attack
C. Mean time between failures
D. Time-of-check to time-of-use

Correct Answer

D. Time-of-check to time-of-use

Question 750

Exam Question

A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:

A. DLL injection
B. Buffer overflow
C. Memory leak
D. Integer overflow

Correct Answer

B. Buffer overflow