100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Test Bank for CompTIA Security+ SY0-601 Cert Guide, 5th edition by Omar Santos

Rating
-
Sold
-
Pages
67
Grade
A+
Uploaded on
20-11-2025
Written in
2025/2026

Test Bank for CompTIA Security+ SY0-601 Cert Guide, 5th edition by Omar Santos

Institution
CompTIA Security+ SY0-601
Course
CompTIA Security+ SY0-601











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Security+ SY0-601
Course
CompTIA Security+ SY0-601

Document information

Uploaded on
November 20, 2025
Number of pages
67
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA Security+ SY0-601 Cert Guide
TU
– 5th Edition


TEST BANK
V
IA
?_
AP
Omar Santos


Comprehensive Test Bank for Instructors and
PR

Students
OV
© Omar Santos



All rights reserved. Reproduction or distribution without permission is prohibited.
ED
??
?

©Medexcellence

, CompTIA Security+ SY0-601 Cert Guide 5th Edition Omar Santos
Chapter 1: Comparing and Contrasting Different Types of Social
TU
Engineering Techniques

1. Which of these is an example of social engineering?
V
A. Phishing
B. Virus
C. Worm
IA
D. Trojan horse

Answer: A

2. Impersonating someone’s identity for the purpose of gaining information is called:
?_
A. Phishing
B. Spear phishing
C. Pretexting
AP
D. Tailgating

Answer: C

3. Smishing attacks are carried out using what medium?

A. Email
PR
B. Text messages
C. Websites
D. Voice

Answer: B
OV
4. Which of these describes a threat actor redirecting a victim from a valid website to a malicious
fake?

A. Pharming
B. Tailgating
ED
C. Dumpster diving
D. Phishing

Answer: A

5. Whaling is most similar to which other kind of attack?
??
A. Credential harvesting
B. Watering hole attack
C. Shoulder surfing
D. Phishing
?

, Answer: D

6. Which of these is NOT a type of social engineering attack?

A. Prepending
TU
B. Piggybacking
C. Spear phishing
D. Pretexting

Answer: A
V
7. Which kind of attack targets users based on the common websites they frequent?

A. Pretexting
IA
B. Watering hole attack
C. Eavesdropping
D. Vishing
?_
Answer: B

8. A social engineer calls an IT specialist sounding panicked and stating that they are an employee who
needs to get into their email account right away to address a time-sensitive request from an
important client. Which motivation technique are they using?
AP
A. Urgency
B. Scarcity
C. Authority
D. Intimidation
PR
Answer: A

9. Which of these is NOT a best practice for avoiding social media attacks?

A. Never share passwords or PINs.
B. Shield keypads and screens when entering authentication information.
OV
C. Examine any unknown removable media to make sure it does not contain malware.
D. Shred any sensitive information destined for garbage or recycling.

Answer: C

10. What government funded research association provides a set of matrices that document the
ED
tactics attackers use to compromise systems?

A. The MITRE Corporation
B. W3C
C. The Social Engineering Toolkit
??
D. MAL*WAR

Answer: A
?

, Chapter 2: Analyzing Potential Indicators to Determine the Type of
Attack
TU
1. Ransomware is a type of what?

A. Cryptoviral extortion
B. Distributed denial of service attack
C. Worm
V
D. Trojan horse

Answer: A
IA
2. Which of these is a program that appears useful but allows an attacker administrator-level access to
a system?

A. Worm
?_
B. Keylogger
C. Rainbow table
D. Remote access Trojan (RAT)

Answer: D
AP
3. What is the purpose of a rootkit?

A. Encrypt important files and ask for payment to decrypt them
B. Spread virus code by attaching to executable files
PR
C. Install at a low level and then perform malicious operations without being detected
D. Secretly record all keystrokes, including passwords

Answer: C

4. Which of these is a key characteristic of a worm?
OV
A. Replicates by attaching itself to executable files
B. Self-replicates
C. Is able to crack weak passwords
D. Appears to be a legitimate program but contains malware

Answer: B
ED
5. A keylogger is a form of what type of malware?

A. Spyware
B. Logic bomb
??
C. Virus
D. Ransomware

Answer: A
?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MedExcellence Western Governors University
View profile
Follow You need to be logged in order to follow users or courses
Sold
221
Member since
2 year
Number of followers
90
Documents
945
Last sold
14 hours ago
MedExcellence: - Verified Solutions, Test Banks & Guides for Medical, Nursing, Business, Engineering, Accounting, Chemistry, Biology & Other Subjects

MedExcellence – Study Smarter with Expert-Curated Guides for Online Learners Are you a busy online student juggling work, life, and school? At MedExcellence, we specialize in providing A+ graded study guides, exam notes, and course summaries that help Western Governors University, SNHU, and ASU Online students master their coursework efficiently. Our materials are created by experienced professionals and top-performing students to help you: - Understand complex concepts quickly - Prepare confidently for assessments - Download instantly—no delays, no fluff - Perfect for competency-based learning - Covers business, healthcare, education, IT, and more - 100% digital and mobile-friendly for online learners Whether you're prepping for performance assessments, final exams, or weekly tasks—MedExcellence is your trusted study companion. Share with fellow online learners and boost your entire cohort's performance. Ace your courses with MedExcellence—optimized for the online student lifestyle.

Read more Read less
3.4

23 reviews

5
11
4
2
3
2
2
1
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions