100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Test Bank for CompTIA Security+ SY0-601 Cert Guide, 5th edition by Omar Santos

Rating
-
Sold
-
Pages
69
Grade
A+
Uploaded on
05-11-2025
Written in
2025/2026

Test Bank for CompTIA Security+ SY0-601 Cert Guide, 5th edition by Omar Santos

Institution
CompTIA Security+ SY0-601
Course
CompTIA Security+ SY0-601











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Security+ SY0-601
Course
CompTIA Security+ SY0-601

Document information

Uploaded on
November 5, 2025
Number of pages
69
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA Security+ SY0-601 Cert Guide
ST
– 5th Edition
UV

TEST BANK
IA
_A
PP
Omar Santos
RO

Comprehensive Test Bank for Instructors and
VE
Students
D?
© Omar Santos

All rights reserved. Reproduction or distribution without permission is prohibited.
??

©STUDYSTREAM

, CompTIA Security+ SY0-601 Cert Guide 5th Edition Omar Santos
ST
Chapter 1: Comparing and Contrasting Different Types of Social
Engineering Techniques
UV
1. Which of these is an example of social engineering?

A. Phishing
B. Virus
C. Worm
D. Trojan horse
IA
Answer: A

2. Impersonating someone’s identity for the purpose of gaining information is called:
_A
A. Phishing
B. Spear phishing
C. Pretexting
D. Tailgating
PP
Answer: C

3. Smishing attacks are carried out using what medium?

A. Email
B. Text messages
RO
C. Websites
D. Voice

Answer: B

4. Which of these describes a threat actor redirecting a victim from a valid website to a malicious
VE
fake?

A. Pharming
B. Tailgating
C. Dumpster diving
D?
D. Phishing

Answer: A

5. Whaling is most similar to which other kind of attack?

A. Credential harvesting
??
B. Watering hole attack
C. Shoulder surfing
D. Phishing

, Answer: D

6. Which of these is NOT a type of social engineering attack?
ST
A. Prepending
B. Piggybacking
C. Spear phishing
D. Pretexting
UV
Answer: A

7. Which kind of attack targets users based on the common websites they frequent?

A. Pretexting
B. Watering hole attack
IA
C. Eavesdropping
D. Vishing

Answer: B
_A
8. A social engineer calls an IT specialist sounding panicked and stating that they are an employee who
needs to get into their email account right away to address a time-sensitive request from an
important client. Which motivation technique are they using?

A. Urgency
PP
B. Scarcity
C. Authority
D. Intimidation

Answer: A
RO
9. Which of these is NOT a best practice for avoiding social media attacks?

A. Never share passwords or PINs.
B. Shield keypads and screens when entering authentication information.
C. Examine any unknown removable media to make sure it does not contain malware.
VE
D. Shred any sensitive information destined for garbage or recycling.

Answer: C

10. What government funded research association provides a set of matrices that document the
tactics attackers use to compromise systems?
D?
A. The MITRE Corporation
B. W3C
C. The Social Engineering Toolkit
D. MAL*WAR
??
Answer: A

, Chapter 2: Analyzing Potential Indicators to Determine the Type of
Attack
ST
1. Ransomware is a type of what?

A. Cryptoviral extortion
UV
B. Distributed denial of service attack
C. Worm
D. Trojan horse

Answer: A

2. Which of these is a program that appears useful but allows an attacker administrator-level access to
IA
a system?

A. Worm
B. Keylogger
_A
C. Rainbow table
D. Remote access Trojan (RAT)

Answer: D

3. What is the purpose of a rootkit?
PP
A. Encrypt important files and ask for payment to decrypt them
B. Spread virus code by attaching to executable files
C. Install at a low level and then perform malicious operations without being detected
D. Secretly record all keystrokes, including passwords
RO
Answer: C

4. Which of these is a key characteristic of a worm?

A. Replicates by attaching itself to executable files
B. Self-replicates
VE
C. Is able to crack weak passwords
D. Appears to be a legitimate program but contains malware

Answer: B
D?
5. A keylogger is a form of what type of malware?

A. Spyware
B. Logic bomb
C. Virus
??
D. Ransomware

Answer: A

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyStream Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
91
Member since
1 year
Number of followers
30
Documents
1228
Last sold
3 days ago
StudySteam - Verified Solutions, Test Banks & Guides for Medical, Nursing, Business, Engineering, Accounting, Chemistry, Biology & Other Subjects

Welcome to Your Exam Success Headquarters! Tired of endless textbook reading? Our shop is your go-to for high-quality, exam-ready study materials designed for university and college students. We specialize in original publisher content, including solutions manuals, test banks, and comprehensive study guides across a wide range of subjects. Every document is an instant PDF download – no waiting, no fuss! Get immediate access to top-tier academic resources like step-by-step solutions and real test formats to truly ace your coursework and exams. Our materials are perfect for exam preparation, offering insights and practice for every study style. Ready to boost your grades? Dive in and discover your next A+ resource. Found something great? Share our shop with your classmates – let's achieve success together!

Read more Read less
3.9

10 reviews

5
5
4
2
3
1
2
1
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions