Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

SY0-501 PRACTICE Test (CompTIA Security, Computer Science) 77 Multiple Choice Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
33
Cijfer
A+
Geüpload op
08-07-2025
Geschreven in
2024/2025

The document contains a series of multiple-choice questions with 100% correct answers related to the Comptia security+ certification exam. It covers various aspects of cybersecurity, including confidentiality, integrity, availability, authentication, security controls, network security, and more. The questions are designed to test the reader's understanding of fundamental security concepts and best practices.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

SY0-501 PRACTICE Test (CompTIA Security, Computer

Science) 77 Multiple Choice Questions and Answers

1. Management within your organization has defined a use case to support confidentiality of

PII stored in a database. Which of the following solution will BEST need this need?

A. Hashing

B. Digital signature

C. Encryption

D. Smart card - ANSWER-C. Encryption

Encryption is the best choice to provide confidentiality of any type of information, including

Personally Identifiable Information (PII) stored in a database. Hashing will support a use case of

supporting integrity. Digital signatures will support a use case of supporting non-repudiation. A

smart card will support a use case of supporting authentication.

2. Management has implemented a policy stating that messages sent between upper-level

executives must arrive without any changes. The IT department is tasked with

implementing technical controls to meet this need. Which security goal does this address?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication - ANSWER-B. Integrity

Integrity provides assurances that data has not been modified and integrity is commonly enforced

with hashing. Confidentiality prevents unauthorized disclosure of data, but doesn’t address

,modifications of data. Availability ensures systems are up and operational when needed and uses

fault tolerance and redundancy methods. Authentication provides proof that users are who they

claim to be.

3. You organization recently implemented two servers that act as failover devices for each

other. Which security goal is your organization pursuing?

A. Obfuscation

B. Integrity

C. Confidentiality

D. Availability - ANSWER-D. Availability

Failover devices increase availability. A failover cluster uses redundant servers to ensure a

service will continue to operate even if one of the servers fails. Obfuscation methods attempt to

make something unclear or difficult to understand and are not related to failover devices.

Integrity methods ensure that data has not been modified. Confidentiality methods such as

encryption prevent the unauthorized disclosure of data.

4. You are tasked with improving the overall security for a database sever. Which of the

following is a preventive control that will assist with this goal?

A. Disabling unnecessary services

B. Identifying the initial baseline configuration

C. Monitoring logs for trends

D. Implementing a backup and restoration plan - ANSWER-A. Disabling

unnecessary services

,Disabling unnecessary services is one of several steps you can take to harden a server. It is a

preventive control because it helps prevent an incident. Identifying the initial baseline

configuration is useful to determine the security posture of the system, but by itself it doesn’t

prevent attacks. Monitoring logs and trend analysis are detective controls, not preventive

controls. A backup and restoration plan is a corrective control.

5. An IT department recently had its hardware budget reduced, but the organization still

expects them to maintain availability of services. Which of the following choices would

BEST help them maintain availability with a reduced budget?

A. Failover clusters

B. Virtualization

C. Bollards

D. Hashing - ANSWER-B. Virtualization

Virtualization provides increased availability because it is much easier to rebuild a virtual server

than a physical server after a failure. Virtualization supports a reduced budget because virtual

servers require less hardware, less space in a data center, less power, and less heating and air

conditioning. Failover clusters are more expensive. Bollards are physical barriers that block

vehicles. Hashing provides integrity, not availability.

6. You want to test new security controls before deploying them. Which of the following

technologies provides the MOST flexibility to meet this goal?

A. Baselines

B. Hardening techniques

C. Virtualization technologies

D. Patch management programs - ANSWER-C. Virtualization technologies

, Virtualization provides a high degree of flexibility when testing security controls because testers

can easily rebuild virtual systems or revert them using a snapshot. Baselines provide a known

starting point, but aren’t flexible because they stay the same. Hardening techniques make

systems more secure than their default configuration. Patch management programs ensure

patches are deployed, but do not test security controls.

7. You suspect that traffic in your network is being rerouted to an unauthorized router

within your network. Which of the following command-line tools would help you narrow

down the problem?

A. ping

B. tracert

C. ipconfig

D. netstat - ANSWER-B. tracert

You can use tracert to track packet flow through a network and if an extra router has been added

to your network, tracert will identify it. You can use ping to check connectivity with a remote

system, but it doesn’t show the route. The ipconfig command will show the network settings on a

Windows computer, but it doesn’t identify failed routers. Netstat shows active connections and

other network statistics on a local system, but it doesn’t identify network paths.

8. The First Bank of Springfield has been experiencing widespread fraud recently. Attackers

are transferring funds out of customer accounts to other banks. The bank began requiring

customers to obtain credentials in person at the bank. However, this hasn't reduced the

number of fraudulent transactions. After reviewing available logs, investigators

determined that these fraudulent transactions are conducted with the customer's actual

Geschreven voor

Vak

Documentinformatie

Geüpload op
8 juli 2025
Aantal pagina's
33
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$21.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
munenesophia36

Maak kennis met de verkoper

Seller avatar
munenesophia36 Johns Hopkins University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
10 maanden
Aantal volgers
0
Documenten
1
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen