Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 1221:

    A company would like to transition its directory service from an OpenLDAP solution to Active Directory. The main goal for this project is security. All authentications to the domain controllers must be as secure as possible. Which of the following should the company use to achieve this goal?

    A. LDAP

    B. RADIUS

    C. Kerberos

    D. Shibboleth

  • Question 1222:

    A network administrator needs to prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the Internet through the same router. Which of the following should be implemented to segment the accounting department from the rest of the users?

    A. Implement VLANs and an ACL.

    B. Install a firewall and create a DMZ.

    C. Create a site-to-site VPN.

    D. Enable MAC address filtering.

  • Question 1223:

    Which of the following provides the ability to attest to the integrity of a system from the initiation of an incident to the time the incident is litigated?

    A. Chain of custody

    B. Data encryption

    C. Legal holds and preservation

    D. Screenshots and witness interviews

  • Question 1224:

    A coffee company, which operates a chain of stores across a large geographical area, is deploying tablets to use as point-of-sale devices. A security consultant has been given the following requirements:

    The cashiers must be able to log in to the devices quickly.

    The devices must be compliant with applicable regulations for credit card usage.

    The risk of loss or theft of the devices must be minimized.

    If devices are lost or stolen, all data must be removed from the device.

    The devices must be capable of being managed from a centralized location.

    Which of the following should the security consultant configure in the MDM polices for the tablets? (Choose two.)

    A. Remote wipe

    B. Cable locks

    C. Screen locks

    D. Geofencing

    E. GPS tagging

    F. Carrier unlocking

  • Question 1225:

    A security analyst performs a vulnerability scan on the local network. Several items are flagged on the report as being critical issues. The security analyst researches each of the vulnerabilities and discovers that one of the critical issues on the report was mitigated in a previous scan. Which of the following MOST likely happened?

    A. A patch was removed

    B. A false positive occurred

    C. The tool has a high crossover error rate

    D. A necessary service was not running

  • Question 1226:

    An administrator needs to protect five websites with SSL certificates. Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes. Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?

    A. One SAN certificate

    B. One Unified Communications Certificate and one wildcard certificate

    C. One wildcard certificate and two standard certificates

    D. Five standard certificates

  • Question 1227:

    A security administrator begins assessing a network with software that checks for available exploits against a known database, using both credentials and external scripts. A report will be compiled and used to confirm patching levels. This is an example of:

    A. penetration testing

    B. fuzzing

    C. static code analysis

    D. vulnerability scanning

  • Question 1228:

    While testing a new application, a developer discovers that the inclusion of an apostrophe in a username causes the application to crash. Which of the following secure coding techniques would be MOST useful to avoid this problem?

    A. Input validation

    B. Code signing

    C. Obfuscation

    D. Encryption

  • Question 1229:

    A company recently contracted a penetration testing firm to conduct an assessment. During the assessment, the penetration testers were able to capture unencrypted communication between directory servers. The penetration testers recommended encrypting this communication to fix the vulnerability. Which of the following protocols should the company implement to close this finding?

    A. DNSSEC

    B. SFTP

    C. Kerberos

    D. LDAPS

  • Question 1230:

    Which of the following are disadvantages of full backups? (Choose three.)

    A. They rely on other backups for recovery

    B. They require the most storage

    C. They demand the most bandwidth

    D. They have the slowest recovery time

    E. They are impossible in virtual environments

    F. They require on-site storage

    G. They are time-consuming to complete

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.