Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 741:

    Which of the following is a risk that is specifically associated with hosting applications in the public cloud?

    A. Unsecured root accounts

    B. Zero-day

    C. Shared tenancy

    D. Insider threat

  • Question 742:

    A small enterprise decides to implement a warm site to be available for business continuity in case of a disaster. Which of the following BEST meets its requirements?

    A. A fully operational site that has all the equipment in place and full data backup tapes on site

    B. A site used for its data backup storage that houses a full-time network administrator

    C. An operational site requiring some equipment to be relocated as well as data transfer to the site

    D. A site staffed with personnel requiring both equipment and data to be relocated there in case of disaster

  • Question 743:

    An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared network resources while traveling. They need to be able to travel to and from different locations on a weekly basis. Shared offices are retained at the headquarters location. The remote workforce will have identical file and system access requirements, and must also be able to log in to the headquarters location remotely. Which of the following BEST represent how the remote employees should have been set up initially? (Select TWO).

    A. User-based access control

    B. Shared accounts

    C. Group-based access control

    D. Mapped drives

    E. Individual accounts

    F. Location-based policies

  • Question 744:

    Which of the following BEST explains the difference between a credentialed scan and a non- credentialed scan?

    A. A credentialed scan sees devices in the network, including those behind NAT, while a non- credentialed scan sees outward-facing applications.

    B. A credentialed scan will not show up in system logs because the scan is running with the necessary authorization, while non-credentialed scan activity will appear in the logs.

    C. A credentialed scan generates significantly more false positives, while a non-credentialed scan generates fewer false positives

    D. A credentialed scan sees the system the way an authorized user sees the system, while a non- credentialed scan sees the system as a guest.

  • Question 745:

    Users are attempting to access a company's website but are transparently redirected to another website. The users confirm the URL is correct. Which of the following would BEST prevent this issue in the future?

    A. DNSSEC

    B. HTTPS

    C. IPSec

    D. TLS/SSL

  • Question 746:

    A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate:

    "Your message has been quarantined for the following policy violation: external_potential_Pll. Please contact the IT security administrator for further details." Which of the following BEST describes why this message was received?

    A. The DLP system flagged the message

    B. The mail gateway prevented the message from being sent to personal email addresses.

    C. The company firewall blocked the recipient's IP address.

    D. The file integrity check failed for the attached files.

  • Question 747:

    An organization wishes to allow its users to select devices for business use but does not want to overwhelm the service desk with requests for too many different device types and models. Which of the following deployment models should the organization use to BEST meet these requirements?

    A. VDI environment

    B. CYOD model

    C. DAC model

    D. BYOD model

  • Question 748:

    Which of the following types of attack is being used when an attacker responds by sending the MAC address of the attacking machine to resolve the MAC to IP address of a valid server?

    A. Session hijacking

    B. IP spoofing

    C. Evil twin

    D. ARP poisoning

  • Question 749:

    Joe, a contractor, is hired by a firm to perform a penetration test against the firm's infrastructure. While conducting the scan, he receives only the network diagram and the network list to scan against the network. Which of the following scan types is Joe performing?

    A. Authenticated

    B. White box

    C. Automated

    D. Gray box

  • Question 750:

    The president of a company that specializes in military contracts receives a request for an interview. During the interview, the reporter seems more interested in discussing the president's family life and personal history than the details of a recent company success. Which of the following security concerns is this MOST likely an example of?

    A. Insider threat

    B. Social engineering

    C. Passive reconnaissance

    D. Phishing

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.