The latest CompTIA Security+ (SY0-501) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-501) exam and earn CompTIA Security+ (SY0-501) certification.
Exam Question 651
An organization is expanding its network team. Currently, it has local accounts on all network devices, but with growth, it wants to move to centrally managed authentication. Which of the following are the BEST solutions for the organization? (Select TWO)
A. TACACS+
B. CHAP
C. LDAP
D. RADIUS
E. MSCHAPv2
Correct Answer:
A. TACACS+
D. RADIUS
Exam Question 652
Which of the following would provide additional security by adding another factor to a smart card?
A. Token
B. Proximity badge
C. Physical key
D. PIN
Correct Answer:
D. PIN
Exam Question 653
An application was recently compromised after some malformed data came in via web form. Which of the following would MOST likely have prevented this?
A. Input validation
B. Proxy server
C. Stress testing
D. Encoding
Correct Answer:
A. Input validation
Exam Question 654
A Chief Information Officer (CIO) has decided it is not cost effective to implement safeguards against a known vulnerability.
Which of the following risk responses does this BEST describe?
A. Transference
B. Avoidance
C. Mitigation
D. Acceptance
Correct Answer:
D. Acceptance
Exam Question 655
A technician is investigating a potentially compromised device with the following symptoms:
- Browser slowness
- Frequent browser crashes
- Hourglass stuck
- New search toolbar
- Increased memory consumption
Which of the following types of malware has infected the system?
A. Man-in-the-browser
B. Spoofer
C. Spyware
D. Adware
Correct Answer:
D. Adware
Exam Question 656
An audit reported has identifies a weakness that could allow unauthorized personnel access to the facility at its main entrance and from there gain access to the network. Which of the following would BEST resolve the vulnerability?
A. Faraday cage
B. Air gap
C. Mantrap
D. Bollards
Correct Answer:
C. Mantrap
Exam Question 657
Which of the following is a deployment concept that can be used to ensure only the required OS access is exposed to software applications?
A. Staging environment
B. Sandboxing
C. Secure baseline
D. Trusted OS
Correct Answer:
B. Sandboxing
Exam Question 658
Which of the following types of penetration test will allow the tester to have access only to password hashes prior to the penetration test?
A. Black box
B. Gray box
C. Credentialed
D. White box
Correct Answer:
B. Gray box
Exam Question 659
Ann, a customer, is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred?
A. Ransomware
B. Keylogger
C. Buffer overflow
D. Rootkit
Correct Answer:
A. Ransomware
Exam Question 660
A systems administrator is configuring a system that uses data classification labels.
Which of the following will the administrator need to implement to enforce access control?
A. Discretionary access control
B. Mandatory access control
C. Role-based access control
D. Rule-based access control
Correct Answer:
B. Mandatory access control