Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 1131:

    A salesperson often uses a USB drive to save and move files from a corporate laptop. The corporate laptop was recently updated, and now the files on the USB are read-only. Which of the following was recently added to the laptop?

    A. Antivirus software

    B. File integrity check

    C. HIPS

    D. DLP

  • Question 1132:

    An organization is developing its mobile device management policies and procedures and is concerned about vulnerabilities associated with sensitive data being saved to a mobile device, as well as weak authentication when using a PIN As part or discussions on the topic several solutions are proposed

    Which of the following controls when required together, will address the protection of data at-rest as well as strong authentication? (Select TWO).

    A. Containerization

    B. FDE

    C. Remote wipe capability

    D. MDM

    E. MFA

    F. OTA updates

  • Question 1133:

    An accountant is attempting to log in to the internal accounting system and receives a message that the website's certificate is fraudulent. The accountant finds instructions for manually installing the new trusted root onto the local machine. Which of the following would be the company's BEST option for this situation in the future?

    A. Utilize a central CRL

    B. Implement certificate management

    C. Ensure access to KMS

    D. Use a stronger cipher suite

  • Question 1134:

    An administrator is implementing a secure web server and wants to ensure that if the web server application s compromised, the application does not have access to other parts of the server or network. Which of the following should the administrator implement? (Select TWO.)

    A. Mandatory access control

    B. Discretionary access control

    C. Rule-based access control

    D. Role-based access control

    E. Attribute-based access control

  • Question 1135:

    Using an ROT13 cipher to protocol confidential information for unauthorized access is known as:

    A. Steganography

    B. Obfuscation

    C. Non repudiation

    D. diffusion

  • Question 1136:

    A security analyst monitors the syslog server and notices the following pinging 10.25.27.31 with 65500 bytes of data Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128 Reply from 10.25.27.31 bytes=65500 times<1ms TTL=128

    Which of the following attacks is occurring?

    A. Memory leak

    B. Buffer overflow

    C. Null pointer deference

    D. Integer overflow

  • Question 1137:

    A company is implementing a tool to mask all PII when moving data from a production server to a testing server. Which of the following security techniques is the company applying?

    A. Data wiping

    B. Steganograpgy

    C. Data obfuscation

    D. Data sanitization

  • Question 1138:

    Which of the following enables sniffing attacks against a switched network?

    A. ARP poisoning

    B. IGMP snooping

    C. IP spoofing

    D. SYN flooding

  • Question 1139:

    An organization is looking to build its second head office another city, which has a history flooding with an average of two flooding every 100 years. The estimated building cost is $1 million, an the estimated damage due to flooding is half of the building's cost.

    Given this information, which of the following is the SLE?

    A. $50,000

    B. $250,000

    C. $500,000

    D. $1,000,000

  • Question 1140:

    A security technician has been given the task of preserving emails that are potentially involved in a dispute between a company and a contractor.

    Which of the following BEST describes this forensic concept?

    A. Legal hold

    B. Chain of custody

    C. Order of volatility

    D. Data acquisition

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.