Leads4pass > CompTIA > CompTIA Security+ > SY0-501 > SY0-501 Online Practice Questions and Answers

SY0-501 Online Practice Questions and Answers

Questions 4

A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company's email filter, website filter, or antivirus.

Which of the following describes what occurred?

A. The user's account was over-privileged.

B. Improper error handling triggered a false negative in all three controls.

C. The email originated from a private email server with no malware protection.

D. The virus was a zero-day attack.

Buy Now
Questions 5

An organization is looking to build its second head office another city, which has a history flooding with an average of two flooding every 100 years. The estimated building cost is $1 million, an the estimated damage due to flooding is half of the building's cost.

Given this information, which of the following is the SLE?

A. $50,000

B. $250,000

C. $500,000

D. $1,000,000

Buy Now
Questions 6

A technician wants to implement PKI-based authentication on an enterprise wireless network. Which of the following should configure to enforce the use for client-site certificates?

A. 802.1X with PEAP

B. WPA2-PSK

C. EAP-TLS

D. RADIUS Federation

Buy Now
Questions 7

After an identified security breach, an analyst is tasked to initiate the IR process. Which of the following is the NEXT step the analyst should take?

A. Recovery

B. Identification

C. Preparation

D. Documentation

E. Escalation

Buy Now
Questions 8

A cryptographer has developed a new proprietary hash function for a company and solicited employees to test the function before recommending its implementation. An employee takes the plaintext version of a document and hashes it, then changes the original plaintext document slightly and hashes it, and continues repeating this process until two identical hash values are produced from two different documents. Which of the following BEST describes this cryptographic attack?

A. Brute force

B. Known plaintext

C. Replay

D. Collision

Buy Now
Questions 9

A systems administrator is auditing the company's Active Directory environment. It is quickly noted that the username "company\bsmith" is interactively logged into several desktops across the organization. Which of the following has the systems administrator MOST likely come across?

A. Service account

B. Shared credentials

C. False positive

D. Local account

Buy Now
Questions 10

A company needs to fix some audit findings related to its physical security. A key finding was that multiple people could physically enter a location at the same time. Which of the following is the BEST control to address this audit finding?

A. Faraday cage

B. Mantrap

C. Biometrics

D. Proximity cards

Buy Now
Questions 11

The Chief Information Security Officer (CISO) is asking for ways to protect against zero-day exploits. The CISO is concerned that an unrecognized threat could compromise corporate data and result in regulatory fines as well as poor

corporate publicity. The network is mostly flat, with split staff/guest wireless functionality.

Which of the following equipment MUST be deployed to guard against unknown threats?

A. Cloud-based antivirus solution, running as local admin, with push technology for definition updates

B. Implementation of an off-site datacenter hosting all company data, as well as deployment of VDI for all client computing needs

C. Host-based heuristic IPS, segregated on a management VLAN, with direct control of the perimeter firewall ACLs

D. Behavior-based IPS with a communication link to a cloud-based vulnerability and threat feed

Buy Now
Questions 12

An application developer has neglected to include input validation checks in the design of the company's new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code, to an application will allow the execution of the custom code at the administrator level. Which of the following BEST identifies this application attack?

A. Cross-site scripting

B. Clickjacking

C. Buffer overflow

D. Replay

Buy Now
Questions 13

A new Chief Information Officer (CIO) has been reviewing the badging and decides to write a policy that all employees must have their badges rekeyed at least annually. Which of the following controls BEST describes this policy?

A. Physical

B. Corrective

C. Technical

D. Administrative

Buy Now
Exam Code: SY0-501
Exam Name: CompTIA Security+ Certification Exam
Last Update: Sep 04, 2023
Questions: 1423
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99