Exam Details

  • Exam Code
    :SY0-501
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1423 Q&As
  • Last Updated
    :Sep 04, 2023

CompTIA CompTIA Certifications SY0-501 Questions & Answers

  • Question 911:

    A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has

    decided to keep the system online anyway, as no upgrade exists form the vendor.

    Which of the following BEST describes the reason why the vulnerability exists?

    A. Default configuration

    B. End-of-life system

    C. Weak cipher suite

    D. Zero-day threats

  • Question 912:

    An organization uses SSO authentication for employee access to network resources. When an employee resigns, as per the organization's security policy, the employee's access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?

    A. Approve the former employee's request, as a password reset would give the former employee access to only the human resources server.

    B. Deny the former employee's request, since the password reset request came from an external email address.

    C. Deny the former employee's request, as a password reset would give the employee access to all network resources.

    D. Approve the former employee's request, as there would not be a security issue with the former employee gaining access to network resources.

  • Question 913:

    A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application's full life cycle. Which of the following software development methodologies is the development team using?

    A. Waterfall

    B. Agile

    C. Rapid

    D. Extreme

  • Question 914:

    A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?

    A. Implement time-of-day restrictions.

    B. Audit file access times.

    C. Secretly install a hidden surveillance camera.

    D. Require swipe-card access to enter the lab.

  • Question 915:

    Which of the following vulnerability types would the type of hacker known as a script kiddie be MOST dangerous against?

    A. Passwords written on the bottom of a keyboard

    B. Unpatched exploitable Internet-facing services

    C. Unencrypted backup tapes

    D. Misplaced hardware token

  • Question 916:

    An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

    A. Passive reconnaissance

    B. Persistence

    C. Escalation of privileges

    D. Exploiting the switch

  • Question 917:

    A black hat hacker is enumerating a network and wants to remain covert during the process. The hacker initiates a vulnerability scan. Given the task at hand the requirement of being covert, which of the following statements BEST indicates that the vulnerability scan meets these requirements?

    A. The vulnerability scanner is performing an authenticated scan.

    B. The vulnerability scanner is performing local file integrity checks.

    C. The vulnerability scanner is performing in network sniffer mode.

    D. The vulnerability scanner is performing banner grabbing.

  • Question 918:

    A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the authentication server before users provide credentials. The wireless network must also support authentication with usernames and passwords.

    Which of the following authentication protocols MUST the security engineer select?

    A. EAP-FAST

    B. EAP-TLS

    C. PEAP

    D. EAP

  • Question 919:

    A system's administrator has finished configuring firewall ACL to allow access to a new web server.

    The security administrator confirms form the following packet capture that there is network traffic from the internet to the web server:

    The company's internal auditor issues a security finding and requests that immediate action be taken. With which of the following is the auditor MOST concerned?

    A. Misconfigured firewall

    B. Clear text credentials

    C. Implicit deny

    D. Default configuration

  • Question 920:

    A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse. Which of the following should the administrator implement? (Select two.)

    A. Geofencing

    B. Remote wipe

    C. Near-field communication

    D. Push notification services

    E. Containerization

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.