CompTIA Security+ SY0-501 Practice Test 02 assesses knowledge on securing network devices, supporting data integrity, non-repudiation, confidentiality, and theft prevention. Ideal for professionals aiming to validate their security skills and understanding of cybersecurity principles.
Netstat
Dig
Tracert
Arp
Rate this question:
Firewall
Layer 2 switch
Proxy server
Web server
Rate this question:
Implementing WPA with TKIP
Disabling SSID broadcast
Enabling MAC filtering
Implementing WPA2 with CCMP
Rate this question:
Split tunnel
Full tunnel
IPsec using Tunnel mode
IPsec using Transport mode
Rate this question:
Disabling unnecessary services
Installing and updating antivirus software
Identifying the baseline
Installing a NIDS
Rate this question:
IaaS
PaaS
SaaS
Public
Rate this question:
SIEM
Nmap
Network Mapper
Network scanner
Rate this question:
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA256
TLS_DH_WITH AES_256_CBC_SHA256
SSL_RSA_WITH_AES_128_CBC_SHA256
Rate this question:
Rootkit
Backdoor
Spam
Trojan
Rate this question:
Phishing
Spam
Trojan
Whaling
Rate this question:
Dictionary Attack
Birthday Attack
Brute Force Attack
Rainbow Tables
Rate this question:
A regulatory framework
A non-regulatory framework
A general-purpose firewall guide
A vendor-specific guide
Rate this question:
Quantitative Assessment
Qualitative Assessment
Threat Assessment
Supply Chain Assessment
Rate this question:
Network Mapper
Protocol Analyzer
Network Scanner
SIEM
Rate this question:
Wiredump
Tcpdump
Netcat
Nmap
Rate this question:
Bollards
Guards
CCTV
Mantrap
Rate this question:
Rate this question:
3DES
MD5
PBKDF2
Database fields
Rate this question:
Wireless
Pinning
Downgrade
Spoofing
Rate this question:
Chain of Custody
Order of Volatility
Time Offset
Screenshot
Rate this question:
CRL
CA
OCSP
CSR
Rate this question:
AUP
Training
Mandatory Vacations
Background Check
Rate this question:
VM escape
VDI snapshot
VM sprawl
Type II hypervisor
Rate this question:
Nothing. Strong passwords aren’t required in applications.
Modify the security policy to accept this password.
Document this as an exception in the application’s documentation.
Direct the application team manager to ensure the application adheres to the organization’s password policy.
Rate this question:
One-factor
Dual-factor
Something you are
Somewhere you are
Rate this question:
Least privilege
Need to know
Group-based privileges
Location-based policies
Rate this question:
Disable all the temporary accounts.
Disable the temporary accounts you’ve noticed are enabled.
Craft a script to identify inactive accounts based on the last time they logged on.
Set account expiration dates for all accounts when creating them.
Rate this question:
The new service
An ACL
ServerA
The VLAN
Rate this question:
Create rules to block all outgoing traffic from a private IP address.
Implement a flood guard on switches.
Add a web application firewall.
Create rules to block all incoming traffic from a private IP address.
Rate this question:
Flood guards
Signatures
Baseline
Honeypot
Rate this question:
An out-of-band IPS
An in-band IPS
A passive IDS
An out-of-band IDS
Rate this question:
Install HIPS on the SCADA systems.
Install a firewall on the border of the SCADA network.
Install a NIPS on the border of the SCADA network.
Install a honeypot on the SCADA network.
Rate this question:
Wireless jamming
IV
Replay
Bluesnarfing
Rate this question:
Permanent
Health
RADIUS
Dissolvable
Rate this question:
Rouge AP
Bluejacking
Evil Attacker
Jamming
Rate this question:
Least functionality
Sandbox
Blacklist
Integrity measurements
Rate this question:
Master image
Application whitelisting
Anti-malware software
Antivirus software
Rate this question:
Screen locks and GPS tagging
Patch management and change management
Screen locks and device encryption
Full device encryption and IaaS
Rate this question:
Geofencing
Geolocation
GPS tagging
Containerization
Rate this question:
The chmod command
A remote wipe
Push notification
The chroot command
Rate this question:
DLP
HSM
COPE
SED
Rate this question:
Downgrade
Wireless
Pinning
Spoofing
Rate this question:
Organized crime
Ransomware
Competitors
Hacktivist
Rate this question:
Let the caller know what operating system and versions are running on the database servers to determine if any further action is needed.
Thank the caller and end the call, report the call to her supervisor, and independently check the vendor for issues.
Ask the caller for his phone number so that she can call him back after checking the servers.
Contact law enforcement personnel.
Rate this question:
Phishing
Zero-day
Open-source intelligence
Hoax
Rate this question:
DoS
DDoS
SYN Flood
Buffer Overflow
Rate this question:
Waterfall
SDLC
Agile
Secure DevOps
Rate this question:
XSRF
Buffer overflow
SQL injection
Dead code
Rate this question:
Quiz Review Timeline (Updated): May 14, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.