Back to Simulator
CompTIA Security+ SY0-601
0% Complete
0/0 Steps
-
FREE EXAM SIMULATORFree Exam Simulator1 Simulator
Time limit: 0
Simulator Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Simulator complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- comptia a+ 0%
- security+ 0%
-
Unfortunately, you didn’t pass the practice exam, but hey, you have unlimited access.😎 Practice makes you perfect! 👊
-
Congratulations! 🥳 You have passed the practice exam successfully! You are one step closer to pass the real exam! We hope to see you again on another certification path.✌️ Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 20
1. Question
What is the term used to describe the security process that utilizes unique physical characteristics of an individual, such as their retina, iris, voice, facial features, or fingerprints, to verify their identity?
CorrectIncorrect -
Question 2 of 20
2. Question
What type of architecture is utilized by developers to create and operate applications and services, without the need for managing underlying infrastructure?
CorrectIncorrect -
Question 3 of 20
3. Question
Which of the following types of disaster recovery sites enables a company to quickly resume normal business operations in the event of a disaster?
CorrectIncorrect -
Question 4 of 20
4. Question
A company has recently noticed a significant decrease in the performance of its network and servers. Upon investigation, it was discovered that a malicious software had infiltrated the network and was using the company’s resources to mine cryptocurrency. Which type of malware is MOST likely responsible for the decrease in network and server performance?
CorrectIncorrect -
Question 5 of 20
5. Question
Match the following password attack techniques with their corresponding definitions:
Sort elements
- Brute force attack
- Rainbow table attack
- Dictionary attack
- Plaintext Attack
-
An attacker submitting many passwords or passphrases with the hope of eventually guessing correctly
-
A type of hacking wherein the perpetrator tries to crack the passwords stored in a database system
-
A method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password
-
An attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).
CorrectIncorrect -
Question 6 of 20
6. Question
Which of the following are considered forms of cross-site request forgery (CSRF) attacks? (Select TWO.)
CorrectIncorrect -
Question 7 of 20
7. Question
What type of attack technique would a hacker utilize in order to gain and maintain ongoing access to a targeted network, with the intention of collecting information over an extended period of time?
CorrectIncorrect -
Question 8 of 20
8. Question
What is the term used to describe the situation in which an Intrusion Detection System (IDS) identifies an activity as an attack, but the activity is actually considered acceptable behavior within the network?
CorrectIncorrect -
Question 9 of 20
9. Question
Which of the following terms describes the tactic of directing individuals from a legitimate webpage to a fraudulent URL, typically used to impersonate a reputable site and collect sensitive information from unsuspecting victims?
CorrectIncorrect -
Question 10 of 20
10. Question
As a developer, you have been tasked with implementing a secure authentication method for a new system. The system requires users to be authenticated using temporary passcodes that are generated based on the current time of day. Which of the following authentication methods would be the most appropriate for this scenario?
CorrectIncorrect -
Question 11 of 20
11. Question
Which of the following options is a network architecture approach that enables the network to be centrally controlled and managed through software applications, providing consistency in network operations regardless of underlying technology?
CorrectIncorrect -
Question 12 of 20
12. Question
You are an IT support technician at a large organization. A user reports that their PC1 can successfully ping the printer on the Marketing team network but is unable to ping the printer on the Sales team network. Which of the following commands would you use to obtain detailed information on the route that packets take from PC1 to the printer on the Sales team network in a Linux environment?
CorrectIncorrect -
Question 13 of 20
13. Question
Which of the following methods would you utilize to conceal confidential information within a non-confidential file or message to prevent detection?
CorrectIncorrect -
Question 14 of 20
14. Question
To complete the access control rules, specify the appropriate port number in accordance with the given firewall configuration requirements.
-
Firewall configuration requirement #1: Allow SMTP and POP3 traffic but prevent IMAP.
Rule #1: access-list 100 allow tcp eq allow tcp eq deny tcp eq
Firewall configuration requirement #2: Allow the DNS server to resolve domain names and prevent DHCP requests from the network.
Rule #2: access-list 100 allow tcp eq deny udp eq
CorrectIncorrect -
-
Question 15 of 20
15. Question
To complete the access control rules, specify the appropriate port number in accordance with the given firewall configuration requirements.
-
Firewall configuration requirement #1: Allow SSH connections but prevent Telnet connections.
Rule #1: access-list 100 allow tcp eq deny tcp eq
Firewall configuration requirement #2: Allow HTTPS traffic but prevent HTTP traffic from/to the network.
Rule #2: access-list 100 allow tcp eq deny tcp eq
CorrectIncorrect -
-
Question 16 of 20
16. Question
A network administrator is trying to troubleshoot a connectivity issue between a client computer and a remote server. The administrator wants to determine the path that packets take to reach the server and identify any potential bottlenecks or failures along the way. Type the command the administrator should use to trace the route from the client (Windows environment) to the server.
-
C:\Users\ExamsDigest>
CorrectIncorrect -
-
Question 17 of 20
17. Question
A security analyst is investigating a potential attack on a company’s network from his Linux workstation. The analyst wants to determine the attack’s origin and identify any potential points of entry. Type the command the analyst should use to trace the route from the company’s network to the suspected source of the attack.
CorrectIncorrect -
Question 18 of 20
18. Question
A security analyst is attempting to gather information about the domain name system (DNS) records for a target website. To complete this task, the analyst needs to execute a Linux command that provides detailed information about a domain’s DNS records. Type the command the analyst should use to gather the required information.
CorrectIncorrect -
Question 19 of 20
19. Question
You are the network administrator for a large organization. One of your employees is having trouble accessing a company website and reports that it appears to be down. To diagnose the issue, you need to determine the IP address of the website in question. In your windows environment, type the command would be the most useful in resolving this issue.
-
C:\Users\ExamsDigest>
CorrectIncorrect -
-
Question 20 of 20
20. Question
Your organization is negotiating a service level agreement (SLA) with its third-party cloud provider. Which of the following metrics would be most useful in determining the acceptable downtime for your organization’s critical services?
CorrectIncorrect