CompTIA Security+ (SY0-501) Exam Questions and Answers

The latest CompTIA Security+ (SY0-501) certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Security+ (SY0-501) exam and earn CompTIA Security+ (SY0-501) certification.

Question 761: A Chief Information Security Officer (CISO) asks the security architect to design a method for contractors to access the company’s internal network securely without allowing access to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of the CISO?

B. PaaS
C. IaaS

Question 762: As part of a corporate merger, two companies are combining resources. As a result, they must transfer files through the Internet in a secure manner. Which of the following protocols would BEST meet this objective? (Choose two.)


Question 763: A company is deploying a file-sharing protocol access a network and needs to select a protocol for authenticating clients. Management requests that the service be configured in the most secure way possible. The protocol must also be capable of mutual authentication, and support SSO and smart card logons. Which of the following would BEST accomplish this task?

A. Store credentials in LDAP
B. Use NTLM authentication
C. Implement Kerberos
D. Use MSCHAP authentication

Question 764: After a security assessment was performed on the enterprise network, it was discovered that:

  • Configuration changes have been made by users without the consent of IT.
  • Network congestion has increased due to the use of social media.
  • Users are accessing file folders and network shares that are beyond the scope of their need to know.

Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)

A. Poorly trained users
B. Misconfigured WAP settings
C. Undocumented assets
D. Improperly configured accounts
E. Vulnerable business processes

Question 765: An organization wants to implement a method to correct risks at the system/application layer. Which of the following is the BEST method to accomplish this goal?

B. IP tunneling
C. Web application firewall
D. Patch management

Question 766: A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: “Your message has been quarantined for the following policy violation: external potential_PII. Please contact the IT security administrator for further details”.
Which of the following BEST describes why this message was received?

A. The DLP system flagged the message.
B. The mail gateway prevented the message from being sent to personal email addresses.
C. The company firewall blocked the recipient’s IP address.
D. The file integrity check failed for the attached files.

Question 767: After discovering the /etc/shadow file had been rewritten, a security administrator noticed an application insecurely creating files in / tmp.
Which of the following vulnerabilities has MOST likely been exploited?

A. Privilege escalation
B. Resource exhaustion
C. Memory leak
D. Pointer dereference

Question 768: A company is planning to build an internal website that allows for access to outside contracts and partners.
A majority of the content will only be to internal employees with the option to share.
Which of the following concepts is MOST appropriate?

B. Proxy
D. Extranet

Question 769: A company has won an important government contract. Several employees have been transferred from their existing projects to support a new contract. Some of the employees who have transferred will be working long hours and still need access to their project information to transition work to their replacements.
Which of the following should be implemented to validate that the appropriate offboarding process has been followed?

A. Separation of duties
B. Time-of-day restrictions
C. Permission auditing
D. Mandatory access control

Question 770: Which of the following access management concepts is MOST closely associated with the use of a password or PIN??

A. Authorization
B. Authentication
C. Accounting
D. Identification

Keyword: SY0-501 Free Exam Dumps, SY0-501 Exam Questions, SY0-501 Exam Dumps, SY0-501 Braindumps, SY0-501 Real Questions, SY0-501 Practice Test, SY0-501 Practice Exam, SY0-501 Free Test, SY0-501 Free Questions, SY0-501 Real Exam Questions and Answers, SY0-501 VCE Dumps, SY0-501 ETE Dumps, SY0-501 PDF Dumps, and SY0-501 Study Guide.

Published by Emma Watson

, an Information Technology Engineer By qualification who loves to write about Windows, macOS and technical solutions for various error and problems. Coming from a solid background in PC building and software development, with complete expertise in touch-based devices, I am constantly keeping an eye out for the latest and greatest!