100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CompTIA Security+ Certification Exam SY0-601 Midterm 1 EXAM WITH ANSWERS

Puntuación
-
Vendido
-
Páginas
66
Grado
A+
Subido en
19-01-2026
Escrito en
2025/2026

CompTIA Security+ Certification Exam SY0-601 Midterm 1 EXAM WITH ANSWERS

Institución
CompTIA Security+ SY0-601
Grado
CompTIA Security+ SY0-601











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CompTIA Security+ SY0-601
Grado
CompTIA Security+ SY0-601

Información del documento

Subido en
19 de enero de 2026
Número de páginas
66
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CompTIA Security+ Certification Exam |\ |\ |\ |\




SY0-601 Midterm 1 EXAM WITH |\ |\ |\ |\ |\




ANSWERS

A social engineering technique whereby attackers under
|\ |\ |\ |\ |\ |\ |\



disguise of a legitimate request attempt to gain access to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



confidential information is commonly referred to as:
|\ |\ |\ |\ |\ |\




Phishing
Privilege escalation |\




Backdoor access |\




Shoulder surfing - CORRECT ANSWERS ✔✔Phishing
|\ |\ |\ |\ |\




Which of the following answers refer to smishing? (Select
|\ |\ |\ |\ |\ |\ |\ |\ |\



2 answers)
|\




Social engineering technique
|\ |\




E-mail communication
|\




Spam over Internet Telephony (SPIT)
|\ |\ |\ |\




Text messaging
|\




Spam over Internet Messaging (SPIM) - CORRECT
|\ |\ |\ |\ |\ |\ |\



ANSWERS ✔✔Social engineering technique |\ |\ |\




Text messaging
|\

,The practice of using a telephone system to manipulate
|\ |\ |\ |\ |\ |\ |\ |\ |\



user into disclosing confidential information is known as:
|\ |\ |\ |\ |\ |\ |\




Whaling
Spear phishing |\




Vishing |\




Pharming - CORRECT ANSWERS ✔✔Vishing |\ |\ |\ |\




Which of the following terms is commonly used to
|\ |\ |\ |\ |\ |\ |\ |\ |\



describe an unsolicited advertising message?
|\ |\ |\ |\




Spyware
Adware
Malware
Spam - CORRECT ANSWERS ✔✔Spam
|\ |\ |\ |\




What type of spam relies on text-based communication?
|\ |\ |\ |\ |\ |\ |\




Vishing
SPIM |\




Bluesnarfing
SPIT - CORRECT ANSWERS ✔✔SPIM
|\ |\ |\ |\

,Phishing scams targeting a specific group of people are
|\ |\ |\ |\ |\ |\ |\ |\ |\



referred to as: |\ |\




Vishing
Spear phishing |\




Spoofing
Whaling - CORRECT ANSWERS ✔✔Spear phishing |\ |\ |\ |\ |\




In computer security, the term "Dumpster diving" is used
|\ |\ |\ |\ |\ |\ |\ |\ |\



to describe a practice of sifting through trash for
|\ |\ |\ |\ |\ |\ |\ |\ |\



discarded documents containing sensitive data. Found |\ |\ |\ |\ |\ |\



documents containing names and surnames of the |\ |\ |\ |\ |\ |\ |\



employees along with the information about positions |\ |\ |\ |\ |\ |\ |\



held in the company and other data can be used to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



facilitate social engineering attacks. Having the |\ |\ |\ |\ |\ |\



documents shredded or incinerated before disposal |\ |\ |\ |\ |\ |\



makes dumpster diving less effective and mitigates the
|\ |\ |\ |\ |\ |\ |\ |\



risk of social engineering attacks.
|\ |\ |\ |\




True
False - CORRECT ANSWERS ✔✔True|\ |\ |\ |\




A situation in which an unauthorized person can view
|\ |\ |\ |\ |\ |\ |\ |\ |\



another user's display or keyboard to learn their password
|\ |\ |\ |\ |\ |\ |\ |\



or other confidential information is referred to as:
|\ |\ |\ |\ |\ |\ |\ |\

, Spear phishing
|\




Tailgating
Shoulder surfing |\ |\




Spoofing - CORRECT ANSWERS ✔✔Shoulder surfing
|\ |\ |\ |\ |\




Which of the following answers refer to the characteristic
|\ |\ |\ |\ |\ |\ |\ |\ |\



features of pharming? (Select 3 answers)
|\ |\ |\ |\ |\




Domain hijacking |\




Traffic redirection
|\ |\




Fraudulent website |\




Password attack |\




Credential harvesting - CORRECT ANSWERS ✔✔Traffic
|\ |\ |\ |\ |\ |\



redirection |\




Fraudulent website |\




Credential harvesting |\




What is tailgating?
|\ |\




Acquiring unauthorized access to confidential data
|\ |\ |\ |\ |\




Looking over someone's shoulder to get information
|\ |\ |\ |\ |\ |\




Gaining unauthorized access to restricted areas by
|\ |\ |\ |\ |\ |\ |\



following another person |\ |\ |\
$25.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EXAMSTUDYPLUG Stanford University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
309
Miembro desde
3 año
Número de seguidores
107
Documentos
18416
Última venta
3 horas hace
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lee mas Leer menos
4.5

230 reseñas

5
155
4
50
3
13
2
5
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes