Certification Exam Prep Questions For CompTIA Security+ (SYO-501)


QuickStart is now offering assessment questions for CompTIA Security+ SY0-501. Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for CompTIA Security+ SY0-501.


Arrow
 

1

A company wants to introduce a new enterprise mobility strategy for all users. Which deployment model will the enterprise use if it wants to allow an employee to choose a mobile phone from a company-approved list of devices?

A. COPE
Incorrect.
B. CYOD
Correct!
C. VDI
Incorrect.
D. BYOD
Incorrect.
2

You have several computers that use the NTLM authentication protocol for client authentication. Network policy requires user passwords with at least 16 characters. What hash algorithm is used for password authentication?

A. MD5
Correct!
B. RIPEMD
Incorrect.
C. LM hash
Incorrect.
D. SHA
Incorrect.
3

A company wants to allow users to access the network using company-issued tablets. Only approved apps can be installed on the devices. What MDM feature provides the necessary functionality to meet this requirement?

A. Asset tracking
Incorrect.
B. Inventory control
Incorrect.
C. Application control
Incorrect.
D. Inventory control
Correct!
4

Your company has started allowing personal mobile devices on the company network. When users connect to the company Wi-Fi, a screen appears that describes what they can and cannot do on the network, and prompts them to click to acknowledge their agreement. If a user does not click Yes, he or she is not allowed to connect to the network. This is an example of what?

A. Acceptable use policy
Correct!
B. End user license agreement
Incorrect.
C. Authentication
Incorrect.
D. User acceptance
Incorrect.
5

A company uses a Layer 2 switch to segment a network. Each department is assigned to a separate network segment. The conference room contains a wireless AP. You need to ensure that when a user connects a laptop computer to the wireless AP in the conference room, the user can access only resources in their own VLAN. What should you use?

A. ACLs
Incorrect.
B. Subnetting
Incorrect.
C. VLAN tagging
Incorrect.
D. 802.1 x
Correct!
6

Which two statements describe the advantages of using the agile the method for application development?(Choose two.)

7

A company has completed a security audit, which has highlighted some gaps. The report has recommended upgrading some network components. The company has provided the following requirements: * Implement a security device that consolidates multiple functions to protect the network, filter malicious websites, and stop SPAM messages. * Implement a tool to identify malware and security incidents using real-time and historical analysis. Which of the following set of devices and tools is BEST suited for that purpose?

A. IPS with STEM
Incorrect.
B. Firewall with Syslog
Incorrect.
C. UTM with STEM
Correct!
D. Firewall with STEM
Incorrect.
8

You receive a direct message from a friend on a social network. The message tells you about an offer to receive a $100 gift card if you are one of the first 25 to respond to a survey. You click the link and become infected with malware. Which two attack principles contribute to the effectiveness of this attack? (Choose two.)

A. Scarcity
Correct!
B. Trust
Correct!
C. Intimidation
Incorrect.
D. Authority
Incorrect.
9

Your Web site has been the repeated target of cross-site request forgery (XSIRF) attacks. You want to try to prevent these from occurring. What should you do?

10

Which solution has been implemented to provide higher security in the DH protocol?

A. Modular exponentiation
Incorrect.
B. SSL
Incorrect.
C. RCA
Incorrect.
D. ECC
Correct!
11

Users report that an application is failing and displaying detailed messaging including stack traces, data dumps, and detailed codes. This results from what type of vulnerability?

A. Untrained users
Incorrect.
B. Certificate mismanagement
Incorrect.
C. Improper error handling
Correct!
D. False positive
Incorrect.
12

A company discovers that is has been under attack from an APT for several months. Through which type of attack was the initial breach most likely accomplished?

A. Tailgating
Incorrect.
B. Watering hole
Incorrect.
C. Brute force
Incorrect.
D. Spear phishing.
Correct!
13

A set of switches is used to implement a VLAN. Where should you enable loop protection?

14

Which is at the outermost (topmost) level of a defense in depth strategy?

A. Data security
Incorrect.
B. Policies and procedures
Correct!
C. Perimeter network
Correct!
D. Control diversity
Incorrect.
15

A competitor learns company secrets by examining the contents of a USB drive that he found in a trash can during a site visit. How can you best mitigate this risk?

16

A user has arrived at a datacenter and has been challenged by three authentication methods as shown in the exhibit. What is the BEST description of the multifactor authentication policy that is in use?

17

A company is setting up a small network that will use smart cards for logon. Which authentication protocol provides native support for smart card logon?

A. MS-CHAP
Incorrect.
B. Kerberos
Correct!
C. PAP
Incorrect.
D. NTLM
Incorrect.
18

A server application is currently under development. It has been discovered that some errors, such as a divide by zero error, can leave the application running in an unstable condition. The application needs to respond more appropriately to errors and generate an error message when they occur. What should you implement?

A. Exception handling
Correct!
B. Patch management
Incorrect.
C. Application hardening
Incorrect.
D. Input validation
Incorrect.
19

You are devising an incident management plan What should be the primary goal of the incident management plan for a DoS attack on the company's ecommerce servers?

20

Several employees received e-mails that appeared to be from an online auction site. When the users click on the link, they are prompted for personal information. When you investigate the link, you discover that it does not go to the auction site, but to a duplicate site set up by an attacker. What kind of attack has occurred?

A. Pharming
Incorrect.
B. Phishing
Correct!
C. Identity theft
Incorrect.
D. Scam
Incorrect.
21

You reconfigure your firewall to support a perimeter network. You deploy two Web servers on the perimeter network. You want to deploy a security tool that can help reconfigure the network automatically in response to detected threats. What should you use?

A. NIPS
Correct!
B. NIDS
Incorrect.
C. Honeypot
Incorrect.
D. Protocol analyzer
Incorrect.
22

Which hash algorithm is used by common implementations of CHAP?

A. PGP
Incorrect.
B. AES
Incorrect.
C. MD5
Correct!
D. SHA
Incorrect.
23

What are two advantages of implementing a vendor diversity policy? (Choose two.)

24

A portion of the results of a recent security audit are shown in the table in the exhibit. What should you do to correct the vulnerability shown in the exhibit?

25

Which of the following protocols are meant for use with passwords and can help mitigate dictionary and brute-force attacks? (Choose two).

A. TrueCrypt
Incorrect.
B. HMAC
Incorrect.
C. PBKDF2
Correct!
D. Bcrypt
Correct!
26

You have deployed PKI within your organization. To meet legal reporting requirements, you need to implement a way to provide decryption keys to a third party on an as-needed basis. What should you do?

27

You are determining environmental control requirements for a data center that will contain several computers? What is the role of an HVAC system in this environment? (Choose two.)

28

A company needs to set up two-factor authentication for a cloud-based application. The authentication should include a one-time use, limited time password that is delivered to the user through the Google Authenticator mobile app. The password should be based on a shared key and the current date and time. What type of authentication should the company use?

A. CAC
Incorrect.
B. TOTP
Correct!
C. PIV
Incorrect.
D. HOTP
Incorrect.
29

An administrator is connected to an access point as shown in the exhibit. Which security mode should the administrator select to configure 802.1x settings?

A. WEP
Incorrect.
B. NONE
Incorrect.
C. WPA2 Enterprise
Correct!
D. WPA2 Personal
Incorrect.
30

Tabletop exercises are used during which aspect of business continuity planning (BCP)?

PDP Url

SY0-501 Sample Question - CompTIA Security+


Self-Paced

Learning Style

Beginner

Difficulty

1 Hour

Course Duration

Certificate

See Sample

Buy Individually
About Individual Course:
  • Individual course plan gives you access to this course
$109.00
$109.00
/ Each

Outline

More Information

More Information
Lab Access No
Learning Style Self-Paced Learning
Difficulty Beginner
Course Duration 1 Hour
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here