Download CompTIA Security+.SY0-501.CertExams.2024-10-21.521q.vcex

Vendor: CompTIA
Exam Code: SY0-501
Exam Name: CompTIA Security+
Date: Oct 21, 2024
File Size: 2 MB
Downloads: 2

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Datacenter access is controlled with proximity badges that record all entries and exits from the datacenter. The access records are used to identify which staff members accessed the data center in the event of equipment theft. Which of the following MUST be prevented in order for this policy to be effective?
  1. Password reuse
  2. Phishing
  3. Social engineering
  4. Tailgating
Correct answer: D
Question 2
Elastic cloud computing environments often reuse the same physical hardware for multiple customers over time as virtual machines are instantiated and deleted. 
This has important implications for which of the following data security concerns? 
  1. Hardware integrity
  2. Data confidentiality
  3. Availability of servers
  4. Integrity of data
Correct answer: B
Question 3
When implementing fire suppression controls in a datacenter it is important to:
  1. Select a fire suppression system which protects equipment but may harm technicians.
  2. Ensure proper placement of sprinkler lines to avoid accidental leakage onto servers.
  3. Integrate maintenance procedures to include regularly discharging the system.
  4. Use a system with audible alarms to ensure technicians have 20 minutes to evacuate.
Correct answer: B
Question 4
A technician is deploying virtual machines for multiple customers on a single physical host to reduce power consumption in a data center. Which of the following should be recommended to isolate the VMs from one another?
  1. Implement a virtual firewall
  2. Install HIPS on each VM
  3. Virtual switches with VLANs
  4. Develop a patch management guide
Correct answer: C
Question 5
Mandatory vacations are a security control which can be used to uncover which of the following?
  1. Fraud committed by a system administrator
  2. Poor password security among users
  3. The need for additional security staff
  4. Software vulnerabilities in vendor code 
Correct answer: A
Question 6
Each server on a subnet is configured to only allow SSH access from the administrator's workstation. Which of the following BEST describes this implementation?
  1. Host-based firewalls
  2. Network firewalls
  3. Network proxy
  4. Host intrusion prevention
Correct answer: A
Question 7
During a security assessment, an administrator wishes to see which services are running on a remote server. Which of the following should the administrator use?
  1. Port scanner
  2. Network sniffer
  3. Protocol analyzer
  4. Process list
Correct answer: A
Question 8
In which of the following categories would creating a corporate privacy policy, drafting acceptable use policies, and group based access control be classified?
  1. Security control frameworks
  2. Best practice
  3. Access control methodologies
  4. Compliance activity
Correct answer: B
Question 9
A system administrator has noticed vulnerability on a high impact production server. A recent update was made available by the vendor that addresses the vulnerability but requires a reboot of the system afterwards. Which of the following steps should the system administrator implement to address the vulnerability?
  1. Test the update in a lab environment, schedule downtime to install the patch, install the patch and reboot the server and monitor for any changes
  2. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the patch, and monitor for any changes
  3. Test the update in a lab environment, backup the server, schedule downtime to install the patch, install the update, reboot the server, and monitor for any changes
  4. Backup the server, schedule downtime to install the patch, installs the patch and monitor for any changes
Correct answer: C
Question 10
Which of the following services are used to support authentication services for several local devices from a central location without the use of tokens?
  1. TACACS+
  2. Smartcards
  3. Biometrics
  4. Kerberos 
Correct answer: A
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!