Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 1331:

    Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user's certificates?

    A. RA

    B. CA

    C. CRL

    D. CSR

  • Question 1332:

    Which of the following cryptographic attacks would salting of passwords render ineffective?

    A. Brute force

    B. Dictionary

    C. Rainbow tables

    D. Birthday

  • Question 1333:

    A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?

    A. LDAP services

    B. Kerberos services

    C. NTLM services

    D. CHAP services

  • Question 1334:

    An application team is performing a load-balancing test for a critical application during off-hours and has requested access to the load balancer to review which servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications running on the load balancer.

    Which of the following is the BEST solution for security analyst to process the request?

    A. Give the application team administrator access during off-hours.

    B. Disable other critical applications before granting the team access.

    C. Give the application team read-only access.

    D. Share the account with the application team.

  • Question 1335:

    An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard.

    Which of the following configuration options should the administrator select for the new wireless router?

    A. WPA+CCMP

    B. WPA2+CCMP

    C. WPA+TKIP

    D. WPA2+TKIP

  • Question 1336:

    A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts.

    For which of the following is the company hiring the consulting firm?

    A. Vulnerability scanning

    B. Penetration testing

    C. Application fuzzing

    D. User permission auditing

  • Question 1337:

    A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company's email filter, website filter, or antivirus.

    Which of the following describes what occurred?

    A. The user's account was over-privileged.

    B. Improper error handling triggered a false negative in all three controls.

    C. The email originated from a private email server with no malware protection.

    D. The virus was a zero-day attack.

  • Question 1338:

    An organization wishes to provide better security for its name resolution services.

    Which of the following technologies BEST supports the deployment of DNSSEC at the organization?

    A. LDAP

    B. TPM

    C. TLS

    D. SSL

    E. PKI

  • Question 1339:

    Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?

    A. Roll back changes in the test environment

    B. Verify the hashes of files

    C. Archive and compress the files

    D. Update the secure baseline

  • Question 1340:

    A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?

    A. A perimeter firewall and IDS

    B. An air gapped computer network

    C. A honeypot residing in a DMZ

    D. An ad hoc network with NAT

    E. A bastion host

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.