Free SY0-601 Exam Braindumps

Pass your CompTIA Security+ Exam exam with these free Questions and Answers

Page 24 of 107
QUESTION 111

- (Exam Topic 3)
A network engineer needs to create a plan for upgrading the wireless infrastructure in a large office Priority must be given to areas that are currently experiencing latency and connection issues. Which of the following would be the BEST resource for determining the order of priority?

  1. A. Nmapn
  2. B. Heat maps
  3. C. Network diagrams
  4. D. Wireshark

Correct Answer: C

QUESTION 112

- (Exam Topic 3)
A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned.
Which of the following attacks is MOST likely being detected?

  1. A. Pass-the-hash
  2. B. Buffer overflow
  3. C. Cross-site scripting
  4. D. Session replay

Correct Answer: A

QUESTION 113

- (Exam Topic 6)
Employees at a company are receiving unsolicited text messages on their corporate cell phones. The unsolicited text messages contain a password reset Link. Which of the attacks is being used to target the company?

  1. A. Phishing
  2. B. Vishing
  3. C. Smishing
  4. D. Spam

Correct Answer: C
Smishing is a type of phishing attack which begins with an attacker sending a text message to an individual. The message contains social engineering tactics to convince the person to click on a malicious link or send sensitive information to the attacker. Criminals use smishing attacks for purposes like:
Learn login credentials to accounts via credential phishing Discover private data like social security numbers
Send money to the attacker Install malware on a phone
Establish trust before using other forms of contact like phone calls or emails
Attackers may pose as trusted sources like a government organization, a person you know, or your bank. And messages often come with manufactured urgency and time-sensitive threats. This can make it more difficult for a victim to notice a scam.
Phone numbers are easy to spoof with VoIP texting, where users can create a virtual number to send and receive texts. If a certain phone number is flagged for spam, criminals can simply recycle it and use a new one.

QUESTION 114

- (Exam Topic 3)
Users have been issued smart cards that provide physical access to a building. The cards also contain tokens that can be used to access information systems. Users can log m to any thin client located throughout the building and see the same desktop each time. Which of the following technologies are being utilized to provide these capabilities? (Select TWO)

  1. A. COPE
  2. B. VDI
  3. C. GPS
  4. D. TOTP
  5. E. RFID
  6. F. BYOD

Correct Answer: BE

QUESTION 115

- (Exam Topic 3)
Which of the following are the MOST likely vectors for the unauthorized inclusion of vulnerable code in a software company’s final software releases? (Select TWO.)

  1. A. Unsecure protocols
  2. B. Use of penetration-testing utilities
  3. C. Weak passwords
  4. D. Included third-party libraries
  5. E. Vendors/supply chain
  6. F. Outdated anti-malware software

Correct Answer: AD

Page 24 of 107

Post your Comments and Discuss CompTIA SY0-601 exam with other Community members: