CompTIA SY0-501 CompTIA Security+ Online Training
CompTIA SY0-501 Online Training
The questions for SY0-501 were last updated at Nov 23,2024.
- Exam Code: SY0-501
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 23,2024
An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents.
Which of the following would assist Company.com with its goal?
- A . Certificate pinning
- B . Certificate stapling
- C . Certificate chaining
- D . Certificate with extended validation
A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials.
Which of the following account types is the systems administrator using?
- A . Shared account
- B . Guest account
- C . Service account
- D . User account
A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials.
Which of the following account types is the systems administrator using?
- A . Shared account
- B . Guest account
- C . Service account
- D . User account
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network.
Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?
- A . WPS
- B . 802.1x
- C . WPA2-PSK
- D . TKIP
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
- A . DES
- B . AES
- C . MD5
- D . WEP
A company has a data classification system with definitions for “Private” and “Public”. The company’s security policy outlines how data should be protected based on type. The company recently added the data type “Proprietary”.
Which of the following is the MOST likely reason the company added this data type?
- A . Reduced cost
- B . More searchable data
- C . Better data classification
- D . Expanded authority of the privacy officer
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
- A . Owner
- B . System
- C . Administrator
- D . User
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation.
Which of the following types of controls does this BEST describe?
- A . Deterrent
- B . Preventive
- C . Detective
- D . Compensating
A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access.
Which of the following types of attacks are MOST likely occurring? (Select two.)
- A . Replay
- B . Rainbow tables
- C . Brute force
- D . Pass the hash
- E . Dictionary
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
– Slow
performance
– Word documents, PDFs, and images no longer opening
– A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor.
With which of the following is the device MOST likely infected?
- A . Spyware
- B . Crypto-malware
- C . Rootkit
- D . Backdoor