Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 22 of 107
QUESTION 101

- (Exam Topic 3)
A security administrator checks the table of a network switch, which shows the following output:
SY0-601 dumps exhibit
Which of the following is happening to this switch?

  1. A. MAC Flooding
  2. B. DNS poisoning
  3. C. MAC cloning
  4. D. ARP poisoning

Correct Answer: A

QUESTION 102

- (Exam Topic 6)
The management team has requested that the security team implement 802.1X into the existing wireless network setup. The following requirements must be met:
• Minimal interruption to the end user
• Mutual certificate validation
Which of the following authentication protocols would meet these requirements?

  1. A. EAP-FAST
  2. B. PSK
  3. C. EAP-TTLS
  4. D. EAP-TLS

Correct Answer: D
EAP-TLS (Extensible Authentication Protocol - Transport Layer Security) is an authentication protocol that uses certificates to provide mutual authentication between the client and the authentication server. It also allows for the encryption of user credentials, making EAP-TLS a secure and reliable authentication protocol. According to the CompTIA Security+ SY0-601 Official Text Book, EAP-TLS is well-suited for wireless networks due to its mutual authentication capabilities and its ability to securely store credentials. It is also the preferred authentication protocol for 802.1X wireless networks.

QUESTION 103

- (Exam Topic 3)
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?

  1. A. False rejection
  2. B. Cross-over error rate
  3. C. Efficacy rale
  4. D. Attestation

Correct Answer: A
where a legitimate user is not recognized. This is also referred to as a Type I error or false non-match rate (FNMR). FRR is measured as a percentage.

QUESTION 104

- (Exam Topic 2)
An IT security manager requests a report on company information that is publicly available. The manager's concern is that malicious actors will be able to access the data without engaging in active reconnaissance. Which of the following is the MOST efficient approach to perform the analysis?

  1. A. Provide a domain parameter to tool.
  2. B. Check public DNS entries using dnsenum.
  3. C. Perform a vulnerability scan targeting a public company’s IR
  4. D. Execute nmap using the options: scan all ports and sneaky mode.

Correct Answer: D

QUESTION 105

- (Exam Topic 6)
A company completed a vulnerability scan. The scan found malware on several systems that were running older versions of Windows. Which of the following is MOST likely the cause of the malware infection?

  1. A. Open permissions
  2. B. Improper or weak patch management
  3. C. Unsecure root accounts
  4. D. Default settings

Correct Answer: B
The reason for this is that older versions of Windows may have known vulnerabilities that have been patched in more recent versions. If a company is not regularly patching their systems, they are leaving those vulnerabilities open to exploit, which can allow malware to infect the systems.
It is important to regularly update and patch systems to address known vulnerabilities and protect against potential malware infections. This is an important aspect of proper security management.
Here is a reference to the CompTIA Security+ certification guide which states that "Properly configuring and maintaining software, including patch management, is critical to protecting systems and data."
Reference: CompTIA Security+ Study Guide: SY0-601 by Emmett Dulaney, Chuck Easttom https://www.wiley.com/en-us/CompTIA+Security++Study+Guide:+SY0-601-p-9781119515968

Page 22 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: