Download CompTIA Security+.SY0-501.PracticeTest.2018-03-29.44q.tqb

Vendor: CompTIA
Exam Code: SY0-501
Exam Name: CompTIA Security+
Date: Mar 29, 2018
File Size: 2 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?
  1. CA public key
  2. Server private key
  3. CSR
  4. OID
Correct answer: D
Question 2
A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to 207.46.130.0:6666. 
Which of the following should the security analyst do to determine if the compromised system still has an active connection?
  1. tracert
  2. netstat
  3. ping
  4. nslookup
Correct answer: B
Question 3
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
  1. The recipient can verify integrity of the software patch.
  2. The recipient can verify the authenticity of the site used to download the patch.
  3. The recipient can request future updates to the software using the published MD5 value.
  4. The recipient can successfully activate the new software patch.
Correct answer: A
Question 4
Refer to the following code:
   
Which of the following vulnerabilities would occur if this is executed?
  1. Page exception
  2. Pointer deference
  3. NullPointerException
  4. Missing null check
Correct answer: C
Question 5
Multiple employees receive an email with a malicious attachment that begins to encrypt their hard drives and mapped shares on their devices when it is opened. 
The network and security teams perform the following actions:
  • Shut down all network shares. 
  • Run an email search identifying all employees who received the malicious message. 
  • Reimage all devices belonging to users who opened the attachment. 
Next, the teams want to re-enable the network shares. Which of the following BEST describes this phase of the incident response process?
  1. Eradication
  2. Containment
  3. Recovery
  4. Lessons learned
Correct answer: C
Question 6
An organization has determined it can tolerate a maximum of three hours of downtime. Which of the following has been specified?
  1. RTO
  2. RPO
  3. MTBF
  4. MTTR
Correct answer: A
Question 7
Which of the following types of keys is found in a key escrow?
  1. Public
  2. Private
  3. Shared
  4. Session
Correct answer: B
Question 8
A security analyst is reviewing the following output from an IPS:
   
 
Given this output, which of the following can be concluded? (Select two.)
  1. The source IP of the attack is coming from 250.19.18.22.
  2. The source IP of the attack is coming from 250.19.18.71.
  3. The attacker sent a malformed IGAP packet, triggering the alert.
  4. The attacker sent a malformed TCP packet, triggering the alert.
  5. The TTL value is outside of the expected range, triggering the alert.
Correct answer: BC
Question 9
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. 
Which of the following technical controls would help prevent these policy violations? (Select two.)
  1. Password expiration
  2. Password length
  3. Password complexity
  4. Password history
  5. Password lockout
Correct answer: AD
Question 10
Which of the following types of cloud infrastructures would allow several organizations with similar structures and interests to realize the benefits of shared storage and resources?
  1. Private
  2. Hybrid
  3. Public
  4. Community
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!