CompTIA Security+ (SY0-501) Exam Questions and Answers

The latest CompTIA Security+ (SY0-501) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-501) exam and earn CompTIA Security+ (SY0-501) certification.

Question 451: Which of the following provides PFS?

A. AES
B. RC4
C. DHE
D. HMAC

Question 452: A Chief Information Officer (CIO) is concerned that encryption keys might be exfiltrated by a contractor. The CIO wants to keep control over key visibility and management. Which of the following would be the BEST solution for the CIO to implement?”

A. HSM
B. CA
C. SSH
D. SSL

Question 453: A company recently implemented a new security system. In the course of configuration, the security administrator adds the following entry:
#Whitelist
USB\VID_13FE&PID_4127&REV_0100

Which of the following security technologies is MOST likely being configured?

A. Application whitelisting
B. HIDS
C. Data execution prevention
D. Removable media control

Question 454: A penetration tester is checking to see if an internal system is vulnerable to an attack using a remote listener. Which of the following commands should the penetration tester use to verify if this vulnerability exists? (Choose two.)

A. tcpdump
B. nc
C. nmap
D. nslookup
E. tail
F. tracert

Question 455: A security administrator is investigating a possible account compromise. The administrator logs onto a desktop computer, executes the command notepad.exe c:\Temp\qkakforlkgfkja.1og, and reviews the following:
Lee,\rI have completed the task that was assigned to me\rrespectfully\rJohn\r
https://www.portal.com\rjohnuser\rilovemycat2

Given the above output, which of the following is the MOST likely cause of this compromise?

A. Virus
B. Worm
C. Rootkit
D. Keylogger

Question 456: Which of the following command line tools would be BEST to identify the services running in a server?

A. Traceroute
B. Nslookup
C. Ipconfig
D. Netstat

Question 457: A security administrator needs to conduct a full inventory of all encryption protocols and cipher suites.
Which of the following tools will the security administrator use to conduct this inventory MOST efficiently?

A. tcpdump
B. Protocol analyzer
C. Netstat
D. Nmap

Question 458: A systems developer needs to provide machine-to-machine interface between an application and a database server in the production environment. This interface will exchange data once per day. Which of the following access control account practices would BEST be used in this situation?

A. Establish a privileged interface group and apply read-write permission to the members of that group.
B. Submit a request for account privilege escalation when the data needs to be transferred.
C. Install the application and database on the same server and add the interface to the local administrator group.
D. Use a service account and prohibit users from accessing this account for development work.

Question 459: Which of the following is an example of federated access management?

A. Windows passing user credentials on a peer-to-peer network
B. Applying a new user account with a complex password
C. Implementing a AAA framework for network access
D. Using a popular website login to provide access to another website

Question 460: A security analyst wishes to scan the network to view potentially vulnerable systems the way an attacker would. Which of the following would BEST enable the analyst to complete the objective?

A. Perform a non-credentialed scan.
B. Conduct an intrusive scan.
C. Attempt escalation of privilege.
D. Execute a credentialed scan.

Keyword: SY0-501 Free Exam Dumps, SY0-501 Exam Questions, SY0-501 Exam Dumps, SY0-501 Braindumps, SY0-501 Real Questions, SY0-501 Practice Test, SY0-501 Practice Exam, SY0-501 Free Test, SY0-501 Free Questions, SY0-501 Real Exam Questions and Answers, SY0-501 VCE Dumps, SY0-501 ETE Dumps, SY0-501 PDF Dumps, and SY0-501 Study Guide.

Published by Emma Watson

, an Information Technology Engineer By qualification who loves to write about Windows, macOS and technical solutions for various error and problems. Coming from a solid background in PC building and software development, with complete expertise in touch-based devices, I am constantly keeping an eye out for the latest and greatest!