Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 231:

    A help desk technician is trying to determine the reason why several high-level officials' account passwords need to be reset shortly after implementing a self-service password reset process. Which of the following would BEST explain the issue?

    A. The system asked for publicly available information

    B. The self-service system was compromised

    C. The account passwords expired

    D. A spear phishing attack occurred

  • Question 232:

    A user is unable to obtain an IP address from the corporate DHCP server. Which of the following is MOST likely the cause?

    A. Default configuration

    B. Resource exhaustion

    C. Memory overflow

    D. Improper input handling

  • Question 233:

    An organization discovers that unauthorized applications have been installed on company-provided mobile phones. The organization issues these devices, but some users have managed to bypass the security controls. Which of the following is the MOST likely issue, and how can the organization BEST prevent this from happening?

    A. The mobile phones are being infected with malware that covertly installs the applications. Implement full disk encryption and integrity-checking software.

    B. Some advanced users are jailbreaking the OS and bypassing the controls. Implement an MDM solution to control access to company resources.

    C. The mobile phones have been compromised by an APT and can no longer be trusted. Scan the devices for the unauthorized software, recall any compromised devices, and issue completely new ones.

    D. Some advanced users are upgrading the devices' OS and installing the applications. The organization should create an AUP that prohibits this activity.

  • Question 234:

    A company occupies the third floor of a leased building that has other tenants. The path from the demarcation point to the company's controlled space runs through unsecured areas managed by other companies. Which of the following could be used to protect the company's cabling as it passes through uncontrolled spaces?

    A. Plenum-rated cables

    B. Cable locks

    C. Conduits

    D. Bayonet Neill-Concelman

  • Question 235:

    A security administrator found the following piece of code referenced on a domain controller's task scheduler:

    $var = GetDomainAdmins If $var != `fabio' SetDomainAdmins = NULL With which of the following types of malware is the code associated?

    A. RAT

    B. Backdoor

    C. Logic bomb

    D. Crypto-malware

  • Question 236:

    An email recipient is unable to open a message encrypted through PKI that was sent from another organization. Which of the following does the recipient need to decrypt the message?

    A. The sender's private key

    B. The recipient's private key

    C. The recipient's public key

    D. The CA's root certificate

    E. The sender's public key

    F. An updated CRL

  • Question 237:

    Which of the following is the proper use of a Faraday cage?

    A. To block electronic signals sent to erase a cell phone

    B. To capture packets sent to a honeypot during an attack

    C. To protect hard disks from access during a forensics investigation

    D. To restrict access to a building allowing only one person to enter at a time

  • Question 238:

    A security professional wants to test a piece of malware that was isolated on a user's computer to document its effect on a system. Which of the following is the FIRST step the security professional should take?

    A. Create a sandbox on the machine.

    B. Open the file and run it.

    C. Create a secure baseline of the system state.

    D. Harden the machine.

  • Question 239:

    In highly secure environments where the risk of malicious actors attempting to steal data is high, which of the following is the BEST reason to deploy Faraday cages?

    A. To provide emanation control to prevent credential harvesting

    B. To minimize signal attenuation over distances to maximize signal strength

    C. To minimize external RF interference with embedded processors

    D. To protect the integrity of audit logs from malicious alteration

  • Question 240:

    The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:

    A. arbitrary code execution.

    B. resource exhaustion.

    C. exposure of authentication credentials.

    D. dereferencing of memory pointers.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.