Comptia Security+ (Sy0-501) Practice Questions

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

CompTIA Security+ (SY0-501)

Practice Questions
Question 1
Joe, a security analyst, is asked by a co-worker, "What is this AAA thing all about in the
security world? Sounds like something I can use for my car." Which of the following terms
should Joe discuss in his response to his co-worker? (Select THREE).

A. Accounting
B. Accountability
C. Authorization
D. Authentication
E. Access
F. Agreement

Question 2
A system administrator is configuring accounts on a newly established server. Which of
the following characteristics BEST differentiates service accounts from other types of
accounts?

A. They can often be restricted in privilege.


B. They are meant for non-person entities.
C. They require special permissions to OS files and folders.
D. They remain disabled in operations.
E. They do not allow passwords to be set.

Question 3
Recently, a company has been facing an issue with shoulder surfing. Which of the
following safeguards would help with this?

A. Screen filters
B. Biometric authentication
C. Smart cards
D. Video cameras

Question 4
The process of presenting a user ID to a validating system is known as:

A. authorization.
B. authentication.
C. identification.
D. single sign-on.

Question 5
An input field that is accepting more data than has been allocated for it in memory is an
attribute of:

A. buffer overflow.
B. memory leak.
C. cross-site request forgery.
D. resource exhaustion.

Question 6
Which of the following if used would BEST reduce the number of successful phishing
attacks?

A. Two-factor authentication
B. Application layer firewall
C. Mantraps
D. User training

Security+ (SY0-501) Answer Key


Question 1) A. Accounting, C. Authorization, and D. Authentication

Question 2) B. They are meant for non-person entities.

Question 3) A. Screen filters

Question 4) C. identification.

Question 5) A. buffer overflow.

Question 6) D. User training

CompTIA Security+ (SY0-601)


Practice Questions
Question 1
A Chief Financial Officer (CFO) has been receiving email messages that have suspicious
links embedded from unrecognized senders. The emails ask the recipient for identity
verification. The IT department has not received reports of this happening to anyone else.
Which of the following is the MOST likely explanation for this behavior?

A. The CFO is the target of a whaling attack.


B. The CFO is the target of identity fraud.
C. The CFO is receiving spam that got past the mail filters.
D. The CFO is experiencing an impersonation attack.

Question 2
Joe, an employee, knows he is going to be fired in three days. Which of the following
characterizations describes the employee?

A. An insider threat
B. A competitor
C. A hacktivist
D. A state actor
Question 3
The IT department receives a call one morning about users being unable to access files on
the network shared drives. An IT technician investigates and determines the files became
encrypted at 12:00 a.m. While the files are being recovered from backups, one of the IT
supervisors realizes the day is the birthday of a technician who was fired two months
prior. Which of the following describes what MOST likely occurred?

A. The fired technician placed a logic bomb.


B. The fired technician installed a rootkit on all the affected users' computers.
C. The fired technician installed ransomware on the file server.
D. The fired technician left a network worm on an old work computer.

Question 4
An organization has a policy in place that states the person who approves firewall
controls/changes cannot be the one implementing the changes. Which of the following
describes this policy?

A. Change management
B. Job rotation
C. Separation of duties
D. Least privilege

Question 5
Which of the following would be the BEST method to prevent the physical theft of staff
laptops at an open-plan bank location with a high volume of customers each day?

A. Guards at the door


B. Cable locks
C. Visitor logs
D. Cameras
Question 6
Which of the following disaster recovery sites would require the MOST time to get
operations back online?

A. Colocation
B. Cold
C. Hot
D. Warm

Question 7
A security manager needed to protect a high-security datacenter, so the manager installed
an access control vestibule that can detect an employee's heartbeat, weight, and badge.
Which of the following did the security manager implement?

A. A physical control
B. A corrective control
C. A compensating control
D. A managerial control

Security+ (SY0-601) Answer Key


Question 1) A. The CFO is the target of a whaling attack.

Question 2) A. An insider threat

Question 3) A. The fired technician placed a logic bomb.

Question 4) C. Separation of duties

Question 5) B. Cable locks

Question 6) B. Cold

Question 7) A. A physical control

You might also like