Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 261:

    During a security audit of a company's network, unsecure protocols were found to be in use. A network administrator wants to ensure browser-based access to company switches is using the most secure protocol. Which of the following protocols should be implemented?

    A. SSH2

    B. TLS1.2

    C. SSL1.3

    D. SNMPv3

  • Question 262:

    An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the organization has installed cryptocurrency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?

    A. Remove the affected servers from the network.

    B. Review firewall and IDS logs to identify possible source IPs.

    C. Identify and apply any missing operating system and software patches.

    D. Delete the malicious software and determine if the servers must be reimaged.

  • Question 263:

    A company recently installed fingerprint scanners at all entrances to increase the facility's security. The scanners were installed on Monday morning, and by the end of the week it was determined that 1.5% of valid users were denied entry. Which of the following measurements do these users fall under?

    A. FRR

    B. FAR

    C. CER

    D. SLA

  • Question 264:

    An attacker has obtained the user ID and password of a datacenter's backup operator and has gained access to a production system. Which of the following would be the attacker's NEXT action?

    A. Perform a passive reconnaissance of the network.

    B. Initiate a confidential data exfiltration process.

    C. Look for known vulnerabilities to escalate privileges.

    D. Create an alternate user ID to maintain persistent access.

  • Question 265:

    Which of the following represents a multifactor authentication system?

    A. An iris scanner coupled with a palm print reader and fingerprint scanner with liveness detection.

    B. A secret passcode that prompts the user to enter a secret key if entered correctly.

    C. A digital certificate on a physical token that is unlocked with a secret passcode.

    D. A one-time password token combined with a proximity badge.

  • Question 266:

    An organization's policy requires users to create passwords with an uppercase letter, lowercase letter, number, and symbol. This policy is enforced with technical controls, which also prevents users from using any of their previous 12

    passwords. The quantization does not use single sign-on, nor does it centralize storage of passwords.

    The incident response team recently discovered that passwords for one system were compromised. Passwords for a completely separate system have NOT been compromised, but unusual login activity has been detected for that separate

    system. Account login has been detected for users who are on vacation.

    Which of the following BEST describes what is happening?

    A. Some users are meeting password complexity requirements but not password length requirements.

    B. The password history enforcement is insufficient, and old passwords are still valid across many different systems.

    C. Some users are reusing passwords, and some of the compromised passwords are valid on multiple systems.

    D. The compromised password file has been brute-force hacked, and the complexity requirements are not adequate to mitigate this risk.

  • Question 267:

    A healthcare company is revamping its IT strategy in light of recent regulations. The company is concerned about compliance and wants to use a pay-per-use model. Which of the following is the BEST solution?

    A. On-premises hosting

    B. Community cloud

    C. Hosted infrastructure

    D. Public SaaS

  • Question 268:

    Which of the following is a security consideration for IoT devices?

    A. IoT devices have built-in accounts that users rarely access.

    B. IoT devices have less processing capabilities.

    C. IoT devices are physically segmented from each other.

    D. IoT devices have purpose-built applications.

  • Question 269:

    The Chief Information Officer (CIO) has determined the company's new PKI will not use OCSP. The purpose of OCSP still needs to be addressed. Which of the following should be implemented?

    A. Build an online intermediate CA.

    B. Implement a key escrow.

    C. Implement stapling.

    D. Install a CRL.

  • Question 270:

    An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?

    A. Upload a separate list of users and passwords with a batch import.

    B. Distribute hardware tokens to the users for authentication to the cloud.

    C. Implement SAML with the organization's server acting as the identity provider.

    D. Configure a RADIUS federation between the organization and the cloud provider.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.