The latest CompTIA Security+ (SY0-601) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-601) exam and earn CompTIA Security+ (SY0-601) certification.
Table of Contents
- Question 741
- Exam Question
- Correct Answer
- Question 742
- Exam Question
- Correct Answer
- Question 743
- Exam Question
- Correct Answer
- Question 744
- Exam Question
- Correct Answer
- Question 745
- Exam Question
- Correct Answer
- Question 746
- Exam Question
- Correct Answer
- Question 747
- Exam Question
- Correct Answer
- Question 748
- Exam Question
- Correct Answer
- Question 749
- Exam Question
- Correct Answer
- Question 750
- Exam Question
- Correct Answer
Question 741
Exam Question
Which of the following terms refer to software/hardware driver manipulation techniques? (Select 2 answers)
A. Prepending
B. Fuzz testing
C. Refactoring
D. Shimming
E. Sideloading
Correct Answer
C. Refactoring
D. Shimming
Question 742
Exam Question
Which of the following alters the external behavior of an application and at the same time does not introduce any changes to the application’s code?
A. Shimming
B. Refactoring
C. API call
D. Sideloading
Correct Answer
A. Shimming
Question 743
Exam Question
A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required is known as:
A. Memory leak
B. Buffer overflow
C. Race condition
D. Integer overflow
Correct Answer
A. Memory leak
Question 744
Exam Question
Which of the following enables the exchange of information between computer programs?
A. API
B. UI
C. Device drivers
D. SDK
Correct Answer
A. API
Question 745
Exam Question
Which type of exploit allows an attacker to take control over a server and use it as a proxy for unauthorized actions?
A. XSRF
B. CSRF
C. XSS
D. SSRF
Correct Answer
D. SSRF
Question 746
Exam Question
In a session replay attack, an attacker steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access or tricking the server into unauthorized operations.
A. True
B. False
Correct Answer
A. True
Question 747
Exam Question
A network replay attack occurs when an attacker intercepts sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.
A. True
B. False
Correct Answer
A. True
Question 748
Exam Question
A situation in which a web form field accepts data other than expected (e.g. server commands) is an example of:
A. Zero-day vulnerability
B. Improper input validation
C. Default configuration
D. Improper error handling
Correct Answer
B. Improper input validation
Question 749
Exam Question
Which of the following terms refers to a vulnerability caused by race conditions?
A. Mean time to failure
B. Replay attack
C. Mean time between failures
D. Time-of-check to time-of-use
Correct Answer
D. Time-of-check to time-of-use
Question 750
Exam Question
A situation in which an application writes to an area of memory it is not supposed to have access to is referred to as:
A. DLL injection
B. Buffer overflow
C. Memory leak
D. Integer overflow
Correct Answer
B. Buffer overflow