Skip to Content

CompTIA Security+ SY0-501 Exam Questions and Answers – Page 4

The latest CompTIA Security+ (SY0-501) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-501) exam and earn CompTIA Security+ (SY0-501) certification.

Exam Question 331

A security administrator is implementing a new WAF solution and has placed some of the web servers behind the WAF, with the WAF set to audit mode. When reviewing the audit logs of external requests and posts to the web servers, the administrator finds the following entry:

When reviewing the audit logs of external requests and posts to the web servers, the administrator finds the following entry

When reviewing the audit logs of external requests and posts to the web servers, the administrator finds the following entry

Based on this data, which of the following actions should the administrator take?

A. Alert the web server administrators to a misconfiguration.
B. Create a blocking policy based on the parameter values.
C. Change the parameter name ‘Account_Name’ identified in the log.
D. Create an alert to generate emails for abnormally high activity.

Correct Answer:
D. Create an alert to generate emails for abnormally high activity.

Exam Question 332

A buffer overflow can result in:

A. loss of data caused by unauthorized command execution.
B. privilege escalation caused by TPM override.
C. reduced key strength due to salt manipulation.
D. repeated use of one-time keys.

Correct Answer:
B. privilege escalation caused by TPM override.

Exam Question 333

Which of the following is a compensating control that will BEST reduce the risk of weak passwords?

A. Requiring the use of one-time tokens
B. Increasing password history retention count
C. Disabling user accounts after exceeding maximum attempts
D. Setting expiration of user passwords to a shorter time

Correct Answer:
A. Requiring the use of one-time tokens

Exam Question 334

Joe, a backup administrator, wants to implement a solution that will reduce the restoration time of physical servers. Which of the following is the BEST method for Joe to use?

A. Differential
B. Incremental
C. Full
D. Snapshots

Correct Answer:
C. Full

Exam Question 335

Which of the following development models entails several iterative and incremental software development methodologies such as Scrum?

A. Spiral
B. Waterfall
C. Agile
D. Rapid

Correct Answer:
C. Agile

Exam Question 336

Which of the following are used to substantially increase the computation time required to crack a password? (Choose two.)

A. BCRYPT
B. Substitution cipher
C. ECDHE
D. PBKDF2
E. Diffie-Hellman

Correct Answer:
A. BCRYPT
D. PBKDF2

Exam Question 337

A network administrator is brute forcing accounts through a web interface. Which of the following would provide the BEST defense from an account password being discovered?

A. Password history
B. Account lockout
C. Account expiration
D. Password complexity

Correct Answer:
B. Account lockout

Exam Question 338

A security engineer wants to add SSL to the public web server. Which of the following would be the FIRST step to implement the SSL certificate?

A. Download the web certificate
B. Install the intermediate certificate
C. Generate a CSR
D. Encrypt the private key

Correct Answer:
C. Generate a CSR

Exam Question 339

Which of the following is a major difference between XSS attacks and remote code exploits?

A. XSS attacks use machine language, while remote exploits use interpreted language
B. XSS attacks target servers, while remote code exploits target clients
C. Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only
D. Remote code exploits allow writing code at the client side and executing it, while XSS attacks require no code to work

Correct Answer:
C. Remote code exploits aim to escalate attackers’ privileges, while XSS attacks aim to gain access only

Exam Question 340

A security analyst is doing a vulnerability assessment on a database server. A scanning tool returns the following information:
Database: CustomerAccess1
Column: Password
Data type: MD5 Hash
Salted?: No

There have been several security breaches on the web server that accesses this database. The security team is instructed to mitigate the impact of any possible breaches. The security team is also instructed to improve the security on this database by making it less vulnerable to offline attacks. Which of the following would BEST accomplish these goals? (Choose two.)

A. Start using salts to generate MD5 password hashes
B. Generate password hashes using SHA-256
C. Force users to change passwords the next time they log on
D. Limit users to five attempted logons before they are locked out
E. Require the web server to only use TLS 1.2 encryption

Correct Answer:
A. Start using salts to generate MD5 password hashes
C. Force users to change passwords the next time they log on