Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 1071:

    A systems administrator recently issued a public/private key pair that will be used tor the company's DNSSEC implementation. Which of the following configurations should the systems administrator implement NEXT?

    A. Create DNSKEY resources with the public key.

    B. instant private key using the RRSIG record

    C. Point the OS record to the company authoritative servers

    D. Add TCP port 443 to the DNS listener

  • Question 1072:

    A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date. The administrator wants to limit disruptions to operations but not consume too many resources. Which of the following types of vulnerability scans should be conducted?

    A. Credentialed

    B. Non-Intrusive

    C. SYN

    D. Port

  • Question 1073:

    Joe a new employee, discovered a thumb drive with the company's logo on it while walking in the parking lot Joe was curious as to the contents of the drive and placed it into his work computer. Shortly after accessing the contents, he noticed the machine was running slower, started to reboot, and displayed new icons on the screen. Which of the following types of attacks occurred?

    A. Social engineering

    B. Brute force attack

    C. MITM

    D. DoS

  • Question 1074:

    A network technician discovered the usernames and passwords used for network device configuration have been compromised by a user with a packet sniffer. Which of the following would secure the credentials from sniffing?

    A. Implement complex passwords.

    B. Use SSH for remote access.

    C. Configure SNMPv2 for device management.

    D. Use TFTP to copy device configuration.

  • Question 1075:

    A company has users and porters in multiple geographic locations and the printers are locked in common areas of the offices. To preserve the confidentially of PII, a security administrator needs to implement the appropriate controls. Which of the following would BEST meet the confidentiality requirements of the data?

    A. Enforcing location-based policy restrictions

    B. Adding location to the standard naming convention

    C. implementing time-of-day restrictions based on location

    D. Conducting regular account maintenance at each location

  • Question 1076:

    A company uses WPA2-PSK, and it appears there are multiple unauthorized connected to the wireless network. A technician suspects this is because the wireless passwords has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the future?

    A. Wireless guest isolation

    B. 802.1X

    C. WPS

    D. MAC address blacklist

  • Question 1077:

    An organization is updating its access control standards for SSL VPN login to include multifactor authentication The security administrator assigned to this project has been given the following guidelines to use when selecting a solution

    High security Lowest false acceptance rate Quick provisioning time for remote users and offshore consultants

    Which of the following solutions will BEST fit this organization's requirements?

    A. AES-256 key fobs

    B. Software tokens

    C. Fingerprint scanners

    D. Iris scanners

  • Question 1078:

    A security analyst is investigating a security breach involving the loss of sensitive data. A user passed the information through social media as vacation photos. Which of the following methods was used to encode the data?

    A. Obfuscation

    B. Steganography

    C. Hashing

    D. Elliptic curve

  • Question 1079:

    A technician wants to add wireless guest capabilities to an enterprise wireless network that is currently implementing 802.1X EAP-TLS The guest network must

    Support client Isolation.

    Issue a unique encryption key to each client.

    Allow guests to register using their personal email addresses

    Which of the following should the technician implement? (Select TWO),

    A. RADIUS Federation

    B. Captive portal

    C. EAP-PEAP

    D. WPA2-PSK

    E. A separate guest SSID

    F. P12 certicate format

  • Question 1080:

    Which of the following is an example of the second A in the AAA model?

    A. The encryption protocol successfully completes the handshake and establishes a connection

    B. The one-time password is keyed in, and the login system grants access.

    C. The event log records a successful login with a type code that indicates an interactive login.

    D. A domain controller confirms membership in the appropriate group

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.