Skip to Content

CompTIA Security+ SY0-501 Exam Questions and Answers – Page 8

The latest CompTIA Security+ (SY0-501) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-501) exam and earn CompTIA Security+ (SY0-501) certification.

Exam Question 761

A Chief Information Security Officer (CISO) asks the security architect to design a method for contractors to access the company’s internal network securely without allowing access to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of the CISO?

A. VPN
B. PaaS
C. IaaS
D. VDI

Correct Answer:
A. VPN

Exam Question 762

As part of a corporate merger, two companies are combining resources. As a result, they must transfer files through the Internet in a secure manner. Which of the following protocols would BEST meet this objective? (Choose two.)

A. LDAPS
B. SFTP
C. HTTPS
D. DNSSEC
E. SRTP

Correct Answer:
B. SFTP
C. HTTPS

Exam Question 763

A company is deploying a file-sharing protocol access a network and needs to select a protocol for authenticating clients. Management requests that the service be configured in the most secure way possible. The protocol must also be capable of mutual authentication, and support SSO and smart card logons. Which of the following would BEST accomplish this task?

A. Store credentials in LDAP
B. Use NTLM authentication
C. Implement Kerberos
D. Use MSCHAP authentication

Correct Answer:
C. Implement Kerberos

Exam Question 764

After a security assessment was performed on the enterprise network, it was discovered that:

  • Configuration changes have been made by users without the consent of IT.
  • Network congestion has increased due to the use of social media.
  • Users are accessing file folders and network shares that are beyond the scope of their need to know.

Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)

A. Poorly trained users
B. Misconfigured WAP settings
C. Undocumented assets
D. Improperly configured accounts
E. Vulnerable business processes

Correct Answer:
A. Poorly trained users
D. Improperly configured accounts

Exam Question 765

An organization wants to implement a method to correct risks at the system/application layer. Which of the following is the BEST method to accomplish this goal?

A. IDS/IPS
B. IP tunneling
C. Web application firewall
D. Patch management

Correct Answer:
C. Web application firewall

Exam Question 766

A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: “Your message has been quarantined for the following policy violation: external potential_PII. Please contact the IT security administrator for further details”.
Which of the following BEST describes why this message was received?

A. The DLP system flagged the message.
B. The mail gateway prevented the message from being sent to personal email addresses.
C. The company firewall blocked the recipient’s IP address.
D. The file integrity check failed for the attached files.

Correct Answer:
A. The DLP system flagged the message.

Exam Question 767

After discovering the /etc/shadow file had been rewritten, a security administrator noticed an application insecurely creating files in / tmp.
Which of the following vulnerabilities has MOST likely been exploited?

A. Privilege escalation
B. Resource exhaustion
C. Memory leak
D. Pointer dereference

Correct Answer:
A. Privilege escalation

Exam Question 768

A company is planning to build an internal website that allows for access to outside contracts and partners.
A majority of the content will only be to internal employees with the option to share.
Which of the following concepts is MOST appropriate?

A. VPN
B. Proxy
C. DMZ
D. Extranet

Correct Answer:
D. Extranet

Exam Question 769

A company has won an important government contract. Several employees have been transferred from their existing projects to support a new contract. Some of the employees who have transferred will be working long hours and still need access to their project information to transition work to their replacements.
Which of the following should be implemented to validate that the appropriate offboarding process has been followed?

A. Separation of duties
B. Time-of-day restrictions
C. Permission auditing
D. Mandatory access control

Correct Answer:
C. Permission auditing

Exam Question 770

Which of the following access management concepts is MOST closely associated with the use of a password or PIN??

A. Authorization
B. Authentication
C. Accounting
D. Identification

Correct Answer:
B. Authentication