Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 191:

    Which of the following is used to validate the integrity of data?

    A. CBC

    B. Blowfish

    C. MD5

    D. RSA

  • Question 192:

    A security technician has been receiving alerts from several servers that indicate load balancers have had a significant increase in traffic. The technician initiates a system scan. The scan results illustrate that the disk space on several servers has reached capacity. The scan also indicates that incoming internet traffic to the servers has increased. Which of the following is the MOST likely cause of the decreased disk space?

    A. Misconfigured devices

    B. Logs and events anomalies

    C. Authentication issues

    D. Unauthorized software

  • Question 193:

    Which of the following is the BEST reason to run an untested application is a sandbox?

    A. To allow the application to take full advantage of the host system's resources and storage

    B. To utilize the host systems antivirus and firewall applications instead of running it own protection

    C. To prevent the application from acquiring escalated privileges and accessing its host system

    D. To increase application processing speed so the host system can perform real-time logging

  • Question 194:

    Upon entering an incorrect password, the logon screen displays a message informing the user that the password does not match the username provided and is not the required length of 12 characters. Which of the following secure coding techniques should a security analyst address with the application developers to follow security best practices?

    A. Input validation

    B. Error handling

    C. Obfuscation

    D. Data exposure

  • Question 195:

    An organization plans to implement multifactor authentication techniques within the enterprise network architecture. Each authentication factor is expected to be a unique control. Which of the following BEST describes the proper employment of multifactor authentication?

    A. Proximity card, fingerprint scanner, PIN

    B. Fingerprint scanner, voice recognition, proximity card

    C. Smart card, user PKI certificate, privileged user certificate

    D. Voice recognition, smart card, proximity card

  • Question 196:

    A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?

    A. Local account

    B. Guest account

    C. Service account

    D. User account

  • Question 197:

    A technician receives a device with the following anomalies: Frequent pop-up ads Show response-time switching between active programs Unresponsive peripherals The technician reviews the following log file entries: File Name Source MD5 Target MD5 Status antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2 Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped Based on the above output, which of the following should be reviewed?

    A. The web application firewall

    B. The file integrity check

    C. The data execution prevention

    D. The removable media control

  • Question 198:

    A security analyst is securing smartphones and laptops for a highly mobile workforce. Priorities include: Remote wipe capabilities Geolocation services Patch management and reporting Mandatory screen locks Ability to require passcodes and pins Ability to require encryption

    Which of the following would BEST meet these requirements?

    A. Implementing MDM software

    B. Deploying relevant group policies to the devices

    C. Installing full device encryption

    D. Removing administrative rights to the devices

  • Question 199:

    A user downloads and installs an MP3 converter, and runs the application. Upon running the application, the antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed?

    A. RAT

    B. Worm

    C. Ransomware

    D. Bot

  • Question 200:

    An attacker exploited a vulnerability on a mail server using the code below.

    Which of the following BEST explains what the attacker is doing?

    A. The attacker is replacing a cookie.

    B. The attacker is stealing a document.

    C. The attacker is replacing a document.

    D. The attacker is deleting a cookie.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.