CompTIA.SY0-501.v2019-01-30.q233

Exam Code:SY0-501
Exam Name:CompTIA Security+ Certification Exam
Certification Provider:CompTIA
Free Question Number:233
Version:v2019-01-30
Rating:
# of views:485
# of Questions views:17874
Start Practice Test

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Other Version
1146 viewsCompTIA.SY0-501.v2018-10-29.q216
1188 viewsCompTIA.SY0-501.v2018-09-25.q211
1272 viewsCompTIA.SY0-501.v2018-09-12.q212
991 viewsCompTIA.SY0-501.v2018-08-14.q135
774 viewsCompTIA.SY0-501.v2018-07-30.q111
914 viewsCompTIA.SY0-501.v2018-06-23.q23
1083 viewsCompTIA.SY0-501.v2018-05-08.q90
528 viewsCompTIA.SY0-501.v2018-04-06.q82
2119 viewsCompTIA.SY0-501.v2018-03-19.q100
1184 viewsCompTIA.SY0-501.v2018-02-27.q60
1500 viewsCompTIA.SY0-501.v2017-10-31.q85
Exam Question List
Question 1: Which of the following should identify critical systems and ...
Question 2: A security administrator needs to address the following audi...
Question 3: The data backup window has expanded into the morning hours a...
Question 4: Which of the following AES modes of operation provide authen...
Question 5: A black hat hacker is enumerating a network and wants to rem...
Question 6: A security technician would like to obscure sensitive data w...
Question 7: A member of the admins group reports being unable to modify ...
Question 8: Which of the following components of printers and MFDs are M...
Question 9: A manager suspects that an IT employee with elevated databas...
Question 10: A security administrator has been assigned to review the sec...
Question 11: A business has recently deployed laptops to all sales employ...
Question 12: Which of the following should be used to implement voice enc...
Question 13: A security administrator is developing training for corporat...
Question 14: After attempting to harden a web server, a security analyst ...
Question 15: A web application is configured to target browsers and allow...
Question 16: An administrator is testing the collision resistance of diff...
Question 17: A network operations manager has added a second row of serve...
Question 18: A security analyst is testing both Windows and Linux systems...
Question 19: Which of the following describes the key difference between ...
Question 20: An attacker wearing a building maintenance uniform approache...
Question 21: A security technician has been receiving alerts from several...
Question 22: A network administrator wants to ensure that users do not co...
Question 23: A technician receives a device with the following anomalies:...
Question 24: A security analyst reviews the following output: (Exhibit) T...
Question 25: After an identified security breach, an analyst is tasked to...
Question 26: A security administrator must implement a system to ensure t...
Question 27: A security administrator has been tasked with improving the ...
Question 28: After a security incident, management is meeting with involv...
Question 29: Joe, a security administrator, needs to extend the organizat...
Question 30: A security manager is creating an account management policy ...
Question 31: A company hires a third-party firm to conduct an assessment ...
Question 32: To determine the ALE of a particular risk, which of the foll...
Question 33: A security engineer is configuring a wireless network with E...
Question 34: The Chief Technology Officer (CTO) of a company, Ann, is put...
Question 35: A systems administrator wants to generate a self-signed cert...
Question 36: A security guard has informed the Chief Information Security...
Question 37: A security team wants to establish an Incident Response plan...
Question 38: A director of IR is reviewing a report regarding several rec...
Question 39: A new intern in the purchasing department requires read acce...
Question 40: A company was recently audited by a third party. The audit r...
Question 41: Joe, the security administrator, sees this in a vulnerabilit...
Question 42: A security administrator is diagnosing a server where the CP...
Question 43: Which of the following technologies would be MOST appropriat...
Question 44: An administrator discovers the following log entry on a serv...
Question 45: During a data breach cleanup, it is discovered that not all ...
Question 46: A security analyst is updating a BIA document. The security ...
Question 47: Phishing emails frequently take advantage of high-profile ca...
Question 48: Which of the following use the SSH protocol?...
Question 49: An employee receives an email, which appears to be from the ...
Question 50: A company's AUP requires: Passwords must meet complexity req...
Question 51: Ann is the IS manager for several new systems in which the c...
Question 52: Which of the following cryptographic algorithms is irreversi...
Question 53: A technician suspects that a system has been compromised. Th...
Question 54: The chief security officer (CS0) has issued a new policy tha...
Question 55: An organization has hired a penetration tester to test the s...
Question 56: A systems administrator is reviewing the following informati...
Question 57: During an application design, the development team specifics...
Question 58: An organization recently moved its custom web applications t...
Question 59: Joe, a user, wants to send Ann, another user, a confidential...
Question 60: A system administrator is configuring a site-to-site VPN tun...
Question 61: An incident involving a workstation that is potentially infe...
Question 62: Attackers have been using revoked certificates for MITM atta...
Question 63: An employee uses RDP to connect back to the office network. ...
Question 64: Which of the following would verify that a threat does exist...
Question 65: An organization is moving its human resources system to a cl...
Question 66: Company A agrees to provide perimeter protection, power, and...
Question 67: While reviewing the monthly internet usage it is noted that ...
Question 68: A computer on a company network was infected with a zero-day...
Question 69: After a merger, it was determined that several individuals c...
Question 70: An in-house penetration tester is using a packet capture dev...
Question 71: Although a web enabled application appears to only allow let...
Question 72: A third-party penetration testing company was able to succes...
Question 73: When it comes to cloud computing, if one of the requirements...
Question 74: A company is allowing a BYOD policy for its staff. Which of ...
Question 75: An organization wants to utilize a common, Internet-based th...
Question 76: A systems administrator wants to protect data stored on mobi...
Question 77: A penetration tester is conducting an assessment on Comptia....
Question 78: A user downloads and installs an MP3 converter, and runs the...
Question 79: A security engineer is faced with competing requirements fro...
Question 80: An in-house penetration tester has been asked to evade a new...
Question 81: A technician must configure a firewall to block external DNS...
Question 82: Following the successful response to a data-leakage incident...
Question 83: Having adequate lighting on the outside of a building is an ...
Question 84: A user typically works remotely over the holidays using a we...
Question 85: An audit takes place after company-wide restricting, in whic...
Question 86: New magnetic locks were ordered for an entire building. In a...
Question 87: An attacker exploited a vulnerability on a mail server using...
Question 88: An organization identifies a number of hosts making outbound...
Question 89: As part of the SDLC, a third party is hired to perform a pen...
Question 90: A bank requires tellers to get manager approval when a custo...
Question 91: A security analyst notices anomalous activity coming from se...
Question 92: A workstation puts out a network request to locate another s...
Question 93: Ann a security analyst is monitoring the IDS console and not...
Question 94: An actor downloads and runs a program against a corporate lo...
Question 95: A company wants to host a publicly available server that per...
Question 96: Which of the following is the BEST choice for a security con...
Question 97: A forensic investigator has run into difficulty recovering u...
Question 98: During a routine vulnerability assessment, the following com...
Question 99: Technicians working with servers hosted at the company's dat...
Question 100: Which of the following are the MAIN reasons why a systems ad...
Question 101: A hacker has a packet capture that contains: (Exhibit) Which...
Question 102: A security analyst has received the following alert snippet ...
Question 103: An organization's primary datacenter is experiencing a two-d...
Question 104: During a monthly vulnerability scan, a server was flagged fo...
Question 105: The Chief Information Security Officer (CISO) is asking for ...
Question 106: Which of the following vulnerability types would the type of...
Question 107: A security administrator needs to implement a system that de...
Question 108: A company offers SaaS, maintaining all customers' credential...
Question 109: An organization plans to implement multifactor authenticatio...
Question 110: Anne, the Chief Executive Officer (CEO), has reported that s...
Question 111: An administrator is configuring access to information locate...
Question 112: Recently several employees were victims of a phishing email ...
Question 113: A user is presented with the following items during the new-...
Question 114: After a routine audit, a company discovers that engineering ...
Question 115: A penetration tester finds that a company's login credential...
Question 116: A security analyst has been asked to perform a review of an ...
Question 117: A software developer wants to ensure that the application is...
Question 118: The POODLE attack is an MITM exploit that affects:...
Question 119: An organization requires users to provide their fingerprints...
Question 120: A security analyst wants to harden the company's VoIP PBX. T...
Question 121: A new mobile application is being developed in-house. Securi...
Question 122: Which of the following differentiates a collision attack fro...
Question 123: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 124: A security analyst is acquiring data from a potential networ...
Question 125: Joe, a technician, is working remotely with his company prov...
Question 126: A security administrator returning from a short vacation rec...
Question 127: A security administrator learns that PII, which was gathered...
Question 128: Which of the following works by implanting software on syste...
Question 129: As part of a new BYOD rollout, a security analyst has been a...
Question 130: Which of the following are used to increase the computing ti...
Question 131: A Security Officer on a military base needs to encrypt sever...
Question 132: An auditor has identified an access control system that can ...
Question 133: A development team has adopted a new approach to projects in...
Question 134: A Chief Information Officer (CIO) drafts an agreement betwee...
Question 135: A chief Financial Officer (CFO) has asked the Chief Informat...
Question 136: A security administrator is configuring a new network segmen...
Question 137: Before an infection was detected, several of the infected de...
Question 138: Which of the following attack types is being carried out whe...
Question 139: A web server, which is configured to use TLS with AES-GCM-25...
Question 140: A security analyst receives an alert from a WAF with the fol...
Question 141: An organization is comparing and contrasting migration from ...
Question 142: Which of the following is the summary of loss for a given ye...
Question 143: A security analyst is attempting to break into a client's se...
Question 144: A group of non-profit agencies wants to implement a cloud se...
Question 145: The Chief Security Officer (CISO) at a multinational banking...
Question 146: Upon entering an incorrect password, the logon screen displa...
Question 147: An organization uses SSO authentication for employee access ...
Question 148: A company wants to ensure that the validity of publicly trus...
Question 149: A technician has installed new vulnerability scanner softwar...
Question 150: Audit logs from a small company's vulnerability scanning sof...
Question 151: A penetration testing is preparing for a client engagement i...
Question 152: During a recent audit, it was discovered that several user a...
Question 153: Which of the following best describes the initial processing...
Question 154: A security administrator is creating a subnet on one of the ...
Question 155: A system administrator needs to implement 802.1x whereby whe...
Question 156: A mobile device user is concerned about geographic positioni...
Question 157: An administrator has concerns regarding the traveling sales ...
Question 158: A security administrator has written a script that will auto...
Question 159: A system's administrator has finished configuring firewall A...
Question 160: A company exchanges information with a business partner. An ...
Question 161: Which of the following is commonly done as part of a vulnera...
Question 162: Which of the following is the BEST reason to run an untested...
Question 163: A copy of a highly confidential salary report was recently f...
Question 164: A vice president at a manufacturing organization is concerne...
Question 165: To reduce disk consumption, an organization's legal departme...
Question 166: After a recent internal breach, a company decided to regener...
Question 167: The availability of a system has been labeled as the highest...
Question 168: A security administrator receives notice that a third-party ...
Question 169: Which of the following types of attacks precedes the install...
Question 170: A security analyst is inspecting the results of a recent int...
Question 171: An organization relies heavily on an application that has a ...
Question 172: A security analyst conducts a manual scan on a known hardene...
Question 173: Which of the following is used to validate the integrity of ...
Question 174: Which of the following is the proper way to quantify the tot...
Question 175: Ann, a security administrator, wants to ensure credentials a...
Question 176: The chief Security Officer (CSO) has reported a rise in data...
Question 177: An administrator intends to configure an IPSec solution that...
Question 178: Which of the following is the GREATEST risk to a company by ...
Question 179: A software development company needs to share information be...
Question 180: A user of the wireless network is unable to gain access to t...
Question 181: A network administrator is attempting to troubleshoot an iss...
Question 182: A security administrator suspects a MITM attack aimed at imp...
Question 183: The IT department is deploying new computers. To ease the tr...
Question 184: A dumpster diver recovers several hard drives from a company...
Question 185: A security analyst is performing a quantitative risk analysi...
Question 186: A new firewall has been places into service at an organizati...
Question 187: Which of the following precautions MINIMIZES the risk from n...
Question 188: An information security analyst needs to work with an employ...
Question 189: A company is deploying smartphones for its mobile salesforce...
Question 190: An application developer is designing an application involvi...
Question 191: A web developer improves client access to the company's REST...
Question 192: An attacker uses a network sniffer to capture the packets of...
Question 193: A company has a security policy that specifies all endpoint ...
Question 194: After a merger between two companies a security analyst has ...
Question 195: A security administrator is trying to encrypt communication....
Question 196: A technician is configuring a wireless guest network. After ...
Question 197: A software development manager is taking over an existing so...
Question 198: A supervisor in your organization was demoted on Friday afte...
Question 199: Company policy requires the use if passphrases instead if pa...
Question 200: Which of the following would meet the requirements for multi...
Question 201: A user needs to send sensitive information to a colleague us...
Question 202: A security analyst accesses corporate web pages and inputs r...
Question 203: Which of the following is the LEAST secure hashing algorithm...
Question 204: A network technician is setting up a segmented network that ...
Question 205: Joe is exchanging encrypted email with another party. Joe en...
Question 206: Which of the following should a security analyst perform FIR...
Question 207: A security architect has convened a meeting to discuss an or...
Question 208: A penetration tester harvests potential usernames from a soc...
Question 209: During a routine audit, it is discovered that someone has be...
Question 210: A company is evaluating cloud providers to reduce the cost o...
Question 211: An organization has several production-critical SCADA superv...
Question 212: A security analyst is securing smartphones and laptops for a...
Question 213: Which of the following controls allows a security guard to p...
Question 214: A help desk is troubleshooting user reports that the corpora...
Question 215: Which of the following could help detect trespassers in a se...
Question 216: The SSID broadcast for a wireless router has been disabled b...
Question 217: Legal authorities notify a company that its network has been...
Question 218: A vulnerability scan is being conducted against a desktop sy...
Question 219: A security program manager wants to actively test the securi...
Question 220: Users in a corporation currently authenticate with a usernam...
Question 221: The security administrator receives an email on a non-compan...
Question 222: A small company's Chief Executive Officer (CEO) has asked it...
Question 223: A cybersecurity analyst is looking into the payload of a ran...
Question 224: A security engineer is configuring a wireless network that m...
Question 225: A company is developing a new system that will unlock a comp...
Question 226: A security analyst is investigating a suspected security bre...
Question 227: An attacker discovers a new vulnerability in an enterprise a...
Question 228: A systems administrator is attempting to recover from a cata...
Question 229: Which of the following could occur when both strong and weak...
Question 230: A member of a digital forensics team, Joe arrives at a crime...
Question 231: A company researched the root cause of a recent vulnerabilit...
Question 232: A security administrator is tasked with conducting an assess...
Question 233: Which of the following are methods to implement HA in a web ...