Skip to Content

CompTIA Security+ SY0-501 Exam Questions and Answers – Page 8

The latest CompTIA Security+ (SY0-501) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-501) exam and earn CompTIA Security+ (SY0-501) certification.

Exam Question 751

A penetration tester has written an application that performs a bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted media. Which of the following BEST describes the action performed by this type of application?

A. Hashing
B. Key exchange
C. Encryption
D. Obfusication

Correct Answer:
D. Obfusication

Exam Question 752

A security analyst is hardening a WiFi infrastructure.
The primary requirements are the following:

  • The infrastructure must allow staff to authenticate using the most secure method.
  • The infrastructure must allow guests to use an “open” WiFi network that logs valid email addresses before granting access to the Internet.

Given these requirements, which of the following statements BEST represents what the analyst should recommend and configure?

A. Configure a captive portal for guests and WPS for staff.
B. Configure a captive portal for staff and WPA for guests.
C. Configure a captive portal for staff and WEP for guests.
D. Configure a captive portal for guest and WPA2 Enterprise for staff

Correct Answer:
D. Configure a captive portal for guest and WPA2 Enterprise for staff

Exam Question 753

While troubleshooting a client application connecting to the network, the security administrator notices the following error: Certificate is not valid.
Which of the following is the BEST way to check if the digital certificate is valid?

A. PKI
B. CRL
C. CSR
D. IPSec

Correct Answer:
B. CRL

Exam Question 754

Which of the following locations contain the MOST volatile data?

A. SSD
B. Paging file
C. RAM
D. Cache memory

Correct Answer:
D. Cache memory

Exam Question 755

A help desk technician receives a phone call from an individual claiming to be an employee of the organization and requesting assistance to access a locked account. The help desk technician asks the individual to provide proof of identity before access can be granted. Which of the following types of attack is the caller performing?

A. Phishing
B. Shoulder surfing
C. Impersonation
D. Dumpster diving

Correct Answer:
C. Impersonation

Exam Question 756

An organization wants to upgrade its enterprise-wide desktop computer solution. The organization currently has 500 PCs active on the network. The Chief Information Security Officer (CISO) suggests that the organization employ desktop imaging technology for such a large scale upgrade. Which of the following is a security benefit of implementing an imaging solution?

A. it allows for faster deployment
B. it provides a consistent baseline
C. It reduces the number of vulnerabilities
D. It decreases the boot time

Correct Answer:
B. it provides a consistent baseline

Exam Question 757

A number of employees report that parts of an ERP application are not working. The systems administrator reviews the following information from one of the employee workstations:

Execute permission denied: financemodule.dll
Execute permission denied: generalledger.dll

Which of the following should the administrator implement to BEST resolve this issue while minimizing risk and attack exposure?

A. Update the application blacklist
B. Verify the DLL’s file integrity
C. Whitelist the affected libraries
D. Place the affected employees in the local administrator’s group

Correct Answer:
C. Whitelist the affected libraries

Exam Question 758

A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with different user roles. Management wants to monitor group performance. Which of the following is the BEST solution for the company to implement?

A. Reduced failed logon attempts
B. Mandatory password changes
C. Increased account lockout time
D. Time-of-day restrictions

Correct Answer:
D. Time-of-day restrictions

Exam Question 759

A systems administrator has implemented multiple websites using host headers on the same server. The server hosts two websites that require encryption and other websites where encryption is optional. Which of the following should the administrator implement to encrypt web traffic for the required websites?

A. Extended domain validation
B. TLS host certificate
C. OCSP stapling
D. Wildcard certificate

Correct Answer:
B. TLS host certificate

Exam Question 760

Which of the following are considered among the BEST indicators that a received message is a hoax? (Choose two.)

A. Minimal use of uppercase letters in the message
B. Warnings of monetary loss to the receiver
C. No valid digital signature from a known security organization
D. Claims of possible damage to computer hardware
E. Embedded URLs

Correct Answer:
C. No valid digital signature from a known security organization
E. Embedded URLs