Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 1321:

    When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:

    A. system sprawl

    B. end-of-life systems

    C. resource exhaustion

    D. a default configuration

  • Question 1322:

    A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords. The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? (Select two.)

    A. The portal will function as a service provider and request an authentication assertion.

    B. The portal will function as an identity provider and issue an authentication assertion.

    C. The portal will request an authentication ticket from each network that is transitively trusted.

    D. The back-end networks will function as an identity provider and issue an authentication assertion.

    E. The back-end networks will request authentication tickets from the portal, which will act as the third-party service provider authentication store.

    F. The back-end networks will verify the assertion token issued by the portal functioning as the identity provider.

  • Question 1323:

    An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?

    A. PEAP

    B. EAP

    C. WPA2

    D. RADIUS

  • Question 1324:

    Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

    A. The scan job is scheduled to run during off-peak hours.

    B. The scan output lists SQL injection attack vectors.

    C. The scan data identifies the use of privileged-user credentials.

    D. The scan results identify the hostname and IP address.

  • Question 1325:

    After a user reports stow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package. The systems administrator reviews the output below:

    Based on the above information, which of the following types of malware was installed on the user's computer?

    A. RAT

    B. Keylogger

    C. Spyware

    D. Worm

    E. Bot

  • Question 1326:

    Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?

    A. Privilege escalation

    B. Pivoting

    C. Process affinity

    D. Buffer overflow

  • Question 1327:

    A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?

    A. Botnet

    B. Ransomware

    C. Polymorphic malware

    D. Armored virus

  • Question 1328:

    Which of the following technologies employ the use of SAML? (Select two.)

    A. Single sign-on

    B. Federation

    C. LDAP

    D. Secure token

    E. RADIUS

  • Question 1329:

    Which of the following attack types BEST describes a client-side attack that is used to manipulate an HTML iframe with JavaScript code via a web browser?

    A. Buffer overflow

    B. MITM

    C. XSS

    D. SQLi

  • Question 1330:

    An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?

    A. Capture and document necessary information to assist in the response.

    B. Request the user capture and provide a screenshot or recording of the symptoms.

    C. Use a remote desktop client to collect and analyze the malware in real time.

    D. Ask the user to back up files for later recovery.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.