Download CompTIA Security+.SY0-501.Test4Prep.2018-06-22.111q.vcex

Vendor: CompTIA
Exam Code: SY0-501
Exam Name: CompTIA Security+
Date: Jun 22, 2018
File Size: 410 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
  1. DES
  2. AES
  3. MD5
  4. WEP
Correct answer: B
Question 2
A company has a data system with definitions for “Private” and “Public”. The company’s security policy outlines how data should be protected based on type. The company recently added the data type “Proprietary”. Which of the following is the MOST likely reason the company added this data type?
  1. Reduced cost
  2. More searchable data
  3. Better data classification
  4. Expanded authority of the privacy officer
Correct answer: C
Question 3
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
  1. Owner
  2. System
  3. Administrator
  4. User
Correct answer: C
Question 4
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
  1. Deterrent
  2. Preventive
  3. Detective
  4. Compensating
Correct answer: A
Question 5
A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access. Which of the following types of attacks are MOST likely occurring? (Select two.)
  1. Replay
  2. Rainbow tables
  3. Brute force
  4. Pass the hash
  5. Dictionary
Correct answer: CE
Question 6
Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
  • Slow performance 
  • Word documents, PDFs, and images no longer opening 
  • A pop-up 
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?
  1. Spyware
  2. Crypto-malware
  3. Rootkit
  4. Backdoor
Correct answer: D
Question 7
A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?
  1. Obtain a list of passwords used by the employee.
  2. Generate a report on outstanding projects the employee handled.
  3. Have the employee surrender company identification.
  4. Have the employee sign an NDA before departing.
Correct answer: C
Question 8
A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?
  1. A perimeter firewall and IDS
  2. An air gapped computer network
  3. A honeypot residing in a DMZ
  4. An ad hoc network with NAT
  5. A bastion host
Correct answer: B
Question 9
Which of the following is an important step to take BEFORE moving any installation packages from a test environment to production?
  1. Roll back changes in the test environment
  2. Verify the hashes of files
  3. Archive and compress the files
  4. Update the secure baseline
Correct answer: B
Question 10
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company’s email filter, website filter, or antivirus. Which of the following describes what occurred?
  1. The user’s account was over-privileged.
  2. Improper error handling triggered a false negative in all three controls.
  3. The email originated from a private email server with no malware protection.
  4. The virus was a zero-day attack.
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!