Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CompTIA > CompTIA Certifications > SY0-501 > SY0-501 Online Practice Questions and Answers

SY0-501 Online Practice Questions and Answers

Questions 4

A vulnerability scanner that uses its running service's access level to better assess vulnerabilities across multiple assets within an organization is performing a:

A. Credentialed scan.

B. Non-intrusive scan.

C. Privilege escalation test.

D. Passive scan.

Buy Now

Correct Answer: A

Questions 5

A user needs to transmit confidential information to a third party. Which of the following should be used to encrypt the message?

A. AES

B. SHA-2

C. SSL

D. RSA

Buy Now

Correct Answer: A

Questions 6

An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared network resources while traveling. They need to be able to travel to and from different locations on a weekly basis. Shared offices are retained at the headquarters location. The remote workforce will have identical file and system access requirements, and must also be able to log in to the headquarters location remotely.

Which of the following BEST represent how the remote employees should have been set up initially? (Choose two.)

A. User-based access control

B. Shared accounts

C. Group-based access control

D. Mapped drives

E. Individual accounts

F. Location-based policies

Buy Now

Correct Answer: CE

Questions 7

A company uses WPA2-PSK, and it appears there are multiple unauthorized connected to the wireless network. A technician suspects this is because the wireless passwords has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the future?

A. Wireless guest isolation

B. 802.1X

C. WPS

D. MAC address blacklist

Buy Now

Correct Answer: B

Questions 8

A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?

A. Implement time-of-day restrictions.

B. Audit file access times.

C. Secretly install a hidden surveillance camera.

D. Require swipe-card access to enter the lab.

Buy Now

Correct Answer: D

Questions 9

A user loses a COPE device. Which of the following should the user do NEXT to protect the data on the device?

A. Call the company help desk to remotely wipe the device.

B. Report the loss to authorities.

C. Check with corporate physical security for the device.

D. Identify files that are potentially missing on the device.

Buy Now

Correct Answer: A

Questions 10

A security administrator needs to conduct a full inventory of all encryption protocols and cipher suites. Which of the following tools will the security administrator use to conduct this inventory MOST efficiently?

A. tcpdump

B. Protocol analyzer

C. Netstat

D. Nmap

Buy Now

Correct Answer: D

Questions 11

A security analyst conducts a manual scan on a known hardened host that identifies many non- compliant items. Which of the following BEST describe why this has occurred? (Select TWO)

A. Privileged-user certificated were used to scan the host

B. Non-applicable plugins were selected in the scan policy

C. The incorrect audit file was used

D. The output of the report contains false positives

E. The target host has been compromised

Buy Now

Correct Answer: BD

Questions 12

A company has noticed multiple instances of proprietary information on public websites. It has also observed an increase in the number of email messages sent to random employees containing malicious links and PDFs. Which of the following changes should the company make to reduce the risks associated with phishing attacks? (Select TWO)

A. Install an additional firewall

B. Implement a redundant email server

C. Block access to personal email on corporate systems

D. Update the X.509 certificates on the corporate email server

E. Update corporate policy to prohibit access to social media websites

F. Review access violation on the file server

Buy Now

Correct Answer: CE

Questions 13

Users are attempting to access a company's website but are transparently redirected to another websites. The users confirm the URL is correct. Which of the following would BEST prevent this issue in the futue?

A. DNSSEC

B. HTTPS

C. IPSec

D. TLS/SSL

Buy Now

Correct Answer: A

Exam Code: SY0-501
Exam Name: CompTIA Security+
Last Update: Sep 04, 2023
Questions: 1423

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.