This CompTIA Security+ SY0-501 Practice Test assesses key cybersecurity skills, focusing on the confidentiality, integrity, and availability of information systems. It evaluates knowledge in implementing preventive controls, maintaining service availability, and the secure management of PII.
Password complexity
Password length
Password history
Password reuse
Rate this question:
Keylogger
Ransomware
Backdoor
Trojan
Rate this question:
Shoulder surfing
Tailgating
Vishing
Dumpster diving
Rate this question:
FTP
SNMPv3
SFTP
SRTP
Rate this question:
Hashing
Digital signature
Encryption
Smart card
Rate this question:
Obfuscation
Integrity
Confidentiality
Availability
Rate this question:
Failover clusters
Virtualization
Bollards
Hashing
Rate this question:
NAC
DMZ
SRTP
VLAN
Rate this question:
Implicit deny
Layered security
Least privilege
Flood guard
Rate this question:
Create an account for Jasper and add the account to the Accounting group.
Give Jasper the password for the Guest account.
Create an account for Jasper and use rule-based access control for accounting.
Create an account for Jasper and add the account to the Administrators group.
Rate this question:
Fail-open cluster
Certificates
Web application firewall
Load balancing
Rate this question:
Baselines
Hardening techniques
Virtualization technologies
Patch management programs
Rate this question:
Mail gateway
UTM appliance
Forward proxy
Reverse proxy
Rate this question:
Smurf
Typo squatting
Fuzzing
Replay
Rate this question:
CCMP
WPA2 Enterprise
SSID broadcast
MAC address filter
Rate this question:
Ping
Tracert
Ipconfig
Netstat
Rate this question:
SSO
Same sign-on
SAML
Kerberos
Rate this question:
The RADIUS server certificate expired.
DNS is providing incorrect host names.
DHCP is issuing duplicate IP addresses.
MAC filtering is enabled.
Rate this question:
Perform a penetration test.
Perform a port scan.
Perform a vulnerability scan.
Perform traffic analysis with a sniffer.
Rate this question:
Detection of unauthorized data transfers
A hardware root of trust
Sandboxing
An external security device used to store cryptographic keys
Rate this question:
Buffer overflow
Zero-day attack
Man-in-the-browser
Session hijacking
Rate this question:
Authentication
Identification
Accounting
Authorization
Rate this question:
Load balancing
Round-robin scheduling
RAID
Warm site
Rate this question:
Ensure hashes are taken first.
Ensure witnesses sign an AUP.
Maintain the order of volatility.
Keep a record of everyone who took possession of the physical asset.
Rate this question:
Disabling unnecessary services
Identifying the initial baseline configuration
Monitoring logs for trends
Implementing a backup and restoration plan
Rate this question:
Content inspection
Malware inspection
URL filter
Web application firewall
Rate this question:
Hacktivist
APT
Competitors
Insiders
Rate this question:
Mantrap
Access list
CCTV
Bollards
Rate this question:
Discretionary access control
Rule-based access control
Separation of duties
Job rotation
Rate this question:
Assign permissions to each user as needed.
Wait for users to request permission and then assign the appropriate permissions.
Delegate authority to assign these permissions.
Use security groups with appropriate permissions.
Rate this question:
Witnesses were not identified.
A chain of custody was not maintained.
An order of volatility was not maintained.
A hard drive analysis was not complete.
Rate this question:
Backdoor
Logic bomb
Rootkit
Botnet
Rate this question:
Preparation
Identification
Eradication
Recovery
Rate this question:
Confidentiality
Integrity
Availability
Authentication
Rate this question:
Use generic accounts.
Create user-based privileges.
Use group-based privileges.
Grant the interns access to the Guest account.
Rate this question:
To increase security for servers accessed from public networks
To provide a secure physical location for networking equipment
To lure attackers to a fake server or fake network
To cache data retrieved from a web server
Rate this question:
Create an internal CA.
Implement WPA2 Enterprise.
Implement patch management processes.
Configure the SCADA within a VLAN.
Rate this question:
HSM
TPM
VLAN
DLP
Rate this question:
IPS
Proxy server
Web application firewall
Honeypot
Rate this question:
Penetration test
Protocol analyzer
Sniffer
Port scanner
Rate this question:
To enforce a separation of duties policy
To enforce a mandatory vacation policy
To enforce a job rotation policy
To enforce an acceptable use policy
Rate this question:
Network-based firewall
Signature-based IDS
Anomaly-based IDS
Honeynet
Rate this question:
NIDS
NAC
DLP
DMZ
Rate this question:
Tailgating
Smart cards
Biometrics
Mantrap
Rate this question:
OCSP
CRL
Private CA
CSR
Rate this question:
SLA
BPA
MOU
ISA
Rate this question:
SIEM
Netcat
Tcpdump
Gray box test
Rate this question:
NAT
DMZ
VPN
802.1x
Rate this question:
Quiz Review Timeline (Updated): Aug 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.