Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 861:

    Technicians working with servers hosted at the company's datacenter are increasingly complaining of electric shocks when touching metal items which have been linked to hard drive failures. Which of the following should be implemented to correct this issue?

    A. Decrease the room temperature

    B. Increase humidity in the room

    C. Utilize better hot/cold aisle configurations

    D. Implement EMI shielding

  • Question 862:

    Which of the following should identify critical systems and components?

    A. MOU

    B. BPA

    C. ITCP

    D. BCP

  • Question 863:

    Which of the following works by implanting software on systems but delays execution until a specific set of conditions is met?

    A. Logic bomb

    B. Trojan

    C. Scareware

    D. Ransomware

  • Question 864:

    A web application is configured to target browsers and allow access to bank accounts to siphon money to a foreign account. This is an example of which of the following attacks?

    A. SQL injection

    B. Header manipulation

    C. Cross-site scripting

    D. Flash cookie exploitation

  • Question 865:

    Company policy requires the use if passphrases instead if passwords. Which of the following technical controls MUST be in place in order to promote the use of passphrases?

    A. Reuse

    B. Length

    C. History

    D. Complexity

  • Question 866:

    During a routine audit, it is discovered that someone has been using a stale administrator account to log into a seldom used server. The person has been using the server to view inappropriate websites that are prohibited to end users. Which of the following could best prevent this from occurring again?

    A. Credential management

    B. Group policy management

    C. Acceptable use policy

    D. Account expiration policy

  • Question 867:

    A security administrator has been tasked with improving the overall security posture related to desktop machines on the network. An auditor has recently that several machines with confidential customer information displayed in the screens are left unattended during the course of the day. Which of the following could the security administrator implement to reduce the risk associated with the finding?

    A. Implement a clean desk policy

    B. Security training to prevent shoulder surfing

    C. Enable group policy based screensaver timeouts

    D. Install privacy screens on monitors

  • Question 868:

    A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit shows that there have been four cases in the previous year where tellers opened accounts without management approval. The

    bank president thought separation of duties would prevent this from happening.

    In order to implement a true separation of duties approach the bank could:

    A. Require the use of two different passwords held by two different individuals to open an account

    B. Administer account creation on a role based access control approach

    C. Require all new accounts to be handled by someone else other than a teller since they have different duties

    D. Administer account creation on a rule based access control approach

  • Question 869:

    A security administrator returning from a short vacation receives an account lock-out message when attempting to log into the computer. After getting the account unlocked the security administrator immediately notices a large amount of emails alerts pertaining to several different user accounts being locked out during the past three days. The security administrator uses system logs to determine that the lock-outs were due to a brute force attack on all accounts that has been previously logged into that machine.

    Which of the following can be implemented to reduce the likelihood of this attack going undetected?

    A. Password complexity rules

    B. Continuous monitoring

    C. User access reviews

    D. Account lockout policies

  • Question 870:

    An attacker discovers a new vulnerability in an enterprise application. The attacker takes advantage of the vulnerability by developing new malware. After installing the malware, the attacker is provided with access to the infected machine. Which of the following is being described?

    A. Zero-day exploit

    B. Remote code execution

    C. Session hijacking

    D. Command injection

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.