Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 851:

    A member of a digital forensics team, Joe arrives at a crime scene and is preparing to collect system dat

    A. Before powering the system off, Joe knows that he must collect the most volatile date first. Which

    B. CPU cache, paging/swap files, RAM, remote logging data

    C. RAM, CPU cache. Remote logging data, paging/swap files

    D. Paging/swap files, CPU cache, RAM, remote logging data

    E. CPU cache, RAM, paging/swap files, remote logging data

  • Question 852:

    A chief Financial Officer (CFO) has asked the Chief Information Officer (CISO) to provide responses to a recent audit report detailing deficiencies in the organization security controls. The CFO would like to know ways in which the organization can improve its authorization controls. Given the request by the CFO, which of the following controls should the CISO focus on in the report? (Select Three)

    A. Password complexity policies

    B. Hardware tokens

    C. Biometric systems

    D. Role-based permissions

    E. One time passwords

    F. Separation of duties

    G. Multifactor authentication

    H. Single sign-on

    I. Lease privilege

  • Question 853:

    A user of the wireless network is unable to gain access to the network. The symptoms are: 1.) Unable to connect to both internal and Internet resources 2.) The wireless icon shows connectivity but has no network access

    The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate. Which of the following is the MOST likely cause of the connectivity issues?

    A. The wireless signal is not strong enough

    B. A remote DDoS attack against the RADIUS server is taking place

    C. The user's laptop only supports WPA and WEP

    D. The DHCP scope is full

    E. The dynamic encryption key did not update while the user was offline

  • Question 854:

    An administrator has concerns regarding the traveling sales team who works primarily from smart phones. Given the sensitive nature of their work, which of the following would BEST prevent access to the data in case of loss or theft?

    A. Enable screensaver locks when the phones are not in use to prevent unauthorized access

    B. Configure the smart phones so that the stored data can be destroyed from a centralized location

    C. Configure the smart phones so that all data is saved to removable media and kept separate from the device

    D. Enable GPS tracking on all smart phones so that they can be quickly located and recovered

  • Question 855:

    While reviewing the monthly internet usage it is noted that there is a large spike in traffic classified as "unknown" and does not appear to be within the bounds of the organizations Acceptable Use Policy. Which of the following tool or technology would work BEST for obtaining more information on this traffic?

    A. Firewall logs

    B. IDS logs

    C. Increased spam filtering

    D. Protocol analyzer

  • Question 856:

    A network administrator wants to ensure that users do not connect any unauthorized devices to the company network. Each desk needs to connect a VoIP phone and computer. Which of the following is the BEST way to accomplish this?

    A. Enforce authentication for network devices

    B. Configure the phones on one VLAN, and computers on another

    C. Enable and configure port channels

    D. Make users sign an Acceptable use Agreement

  • Question 857:

    The Chief Security Officer (CISO) at a multinational banking corporation is reviewing a plan to upgrade the entire corporate IT infrastructure. The architecture consists of a centralized cloud environment hosting the majority of data, small

    server clusters at each corporate location to handle the majority of customer transaction processing, ATMs, and a new mobile banking application accessible from smartphones, tablets, and the Internet via HTTP. The corporation does

    business having varying data retention and privacy laws.

    Which of the following technical modifications to the architecture and corresponding security controls should be implemented to provide the MOST complete protection of data?

    A. Revoke exiting root certificates, re-issue new customer certificates, and ensure all transactions are digitally signed to minimize fraud, implement encryption for data in-transit between data centers

    B. Ensure all data is encryption according to the most stringent regulatory guidance applicable, implement encryption for data in-transit between data centers, increase data availability by replicating all data, transaction data, logs between each corporate location

    C. Store customer data based on national borders, ensure end-to end encryption between ATMs, end users, and servers, test redundancy and COOP plans to ensure data is not inadvertently shifted from one legal jurisdiction to another with more stringent regulations

    D. Install redundant servers to handle corporate customer processing, encrypt all customer data to ease the transfer from one country to another, implement end-to-end encryption between mobile applications and the cloud.

  • Question 858:

    A security administrator must implement a system to ensure that invalid certificates are not used by a custom developed application. The system must be able to check the validity of certificates even when internet access is unavailable. Which of the following MUST be implemented to support this requirement?

    A. CSR

    B. OCSP

    C. CRL

    D. SSH

  • Question 859:

    A technician has installed new vulnerability scanner software on a server that is joined to the company domain. The vulnerability scanner is able to provide visibility over the patch posture of all company's clients. Which of the following is being used?

    A. Gray box vulnerability testing

    B. Passive scan

    C. Credentialed scan

    D. Bypassing security controls

  • Question 860:

    A portable data storage device has been determined to have malicious firmware. Which of the following is the BEST course of action to ensure data confidentiality?

    A. Format the device

    B. Re-image the device

    C. Perform virus scan in the device

    D. Physically destroy the device

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.