Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 301:

    A systems administrator is increasing the security settings on a virtual host to ensure users on one VM cannot access information from another VM. Which of the following is the administrator protecting against?

    A. VM sprawl

    B. VM escape

    C. VM migration

    D. VM sandboxing

  • Question 302:

    A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by using the company VPN. Which of the following would provide the required level of authentication?

    A. 802.1X and OTP

    B. Fingerprint scanner and voice recognition

    C. RBAC and PIN

    D. Username/Password and TOTP

  • Question 303:

    A company network is currently under attack. Although security controls are in place to stop the attack, the security administrator needs more information about the types of attacks being used. Which of the following network types would BEST help the administrator gather this information?

    A. DMZ

    B. Guest network

    C. Ad hoc

    D. Honeynet

  • Question 304:

    An organization's research department uses workstations in an air-gapped network. A competitor released products based on files that originated in the research department. Which of the following should management do to improve the security and confidentiality of the research files?

    A. Implement multifactor authentication on the workstations.

    B. Configure removable media controls on the workstations.

    C. Install a web application firewall in the research department.

    D. Install HIDS on each of the research workstations.

  • Question 305:

    A security analyst is running a credential-based vulnerability scanner on a Windows host. The vulnerability scanner is using the protocol NetBIOS over TCP/IP to connect to various systems, However, the scan does not return any results. To address the issue, the analyst should ensure that which of the following default ports is open on systems?

    A. 135

    B. 137

    C. 3389

    D. 5060

  • Question 306:

    Which of the following is the MOST significant difference between intrusive and non-intrusive vulnerability scanning?

    A. One uses credentials, but the other does not.

    B. One has a higher potential for disrupting system operations.

    C. One allows systems to activate firewall countermeasures.

    D. One returns service banners, including running versions.

  • Question 307:

    While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times on the day the passwords are set to expire. The analyst suspects they are cycling their passwords to circumvent current password controls. Which of the following would provide a technical control to prevent this activity from occurring?

    A. Set password aging requirements.

    B. Increase the password history from three to five.

    C. Create an AUP that prohibits password reuse.

    D. Implement password complexity requirements.

  • Question 308:

    A Chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the following should be at the top of the CISO's list?

    A. Identify redundant and high-availability systems.

    B. Identity mission-critical applications and systems.

    C. Identify the single point of failure in the system.

    D. Identity the impact on safety of the property.

  • Question 309:

    Which of the following should a technician use to protect a cellular phone that is needed for an investigation, to ensure the data will not be removed remotely?

    A. Air gap

    B. Secure cabinet

    C. Faraday cage

    D. Safe

  • Question 310:

    Which of the following BEST describes the purpose of authorization?

    A. Authorization provides logging to a resource and comes after authentication.

    B. Authorization provides authentication to a resource and comes after identification.

    C. Authorization provides identification to a resource and comes after authentication.

    D. Authorization provides permissions to a resource and comes after authentication.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.