Book Image

CompTIA Security+ Practice Tests SY0-501

By : Ian Neil
Book Image

CompTIA Security+ Practice Tests SY0-501

By: Ian Neil

Overview of this book

CompTIA Security+ is a core security certification that will validate your baseline skills for a career in cybersecurity. Passing this exam will not only help you identify security incidents but will also equip you to resolve them efficiently. This book builds on the popular CompTIA Security+ Certification Guide, which mirrors the SY0-501 exam pattern. This practice test-based guide covers all six domains of the Security+ SY0-501 exam: threats, attacks, and vulnerabilities; technologies and tools; architecture and design; identity and access management; cryptography and PKI; and risk management. You’ll take six mock tests designed as per the official Security+ certification exam pattern, each covering significant aspects from an examination point of view. For each domain, the book provides a dedicated cheat sheet that includes important concepts covered in the test. You can even time your tests to simulate the actual exam. These tests will help you identify gaps in your knowledge and discover answers to tricky exam questions. By the end of this book, you’ll have developed and enhanced the skills necessary to pass the official CompTIA Security+ exam.
Table of Contents (9 chapters)

Practice Test 5 – Open Questions – Technologies and Tools

Start off by answering the questions that you have the knowledge base to answer, then on a separate list write down the questions that you do not know the answers to, because you need to revise those areas before testing:

1. The ACL for a firewall has an allow rule for HTTP, HTTPS, and LDAP. What will happen when a user tries to download a file from an external FTP server?

2. A network administrator is configuring a switch and is unsure whether to enable port security or 802.1x. What can you advise on both of these technologies?

3. A security administrator is enabling IPSec on the file server that hosts the financial server. They are then going to enable IPSec between the server and all of the desktops being the financial users. What mode of IPSec will be adopted?

4. What type of firewall is best suited to deal with an incoming SYN flood attack?

5. A security administrator is enabling an L2TP/IPSec on a virtual private network. What will be the role of a VPN concentrator?

6. Your company is experiencing a very high volume of web traffic coming to their internet web servers. What is the best way to ensure that the people coming to your website get the web pages in a timely manner?

7. Your company is experiencing a high volume of DDoS traffic heading for your company's network. What is the best way to deal with this traffic?

8. What is the purpose of DNS round-robin, and what are the pitfalls of using it?

9. How can I capture the commands going to a network-based gaming application?

10. Your company provides internet access to films. What type of port should we use to ensure that the films run smoothly?

11. What type of tool can we use to determine the patch level version of a web server? Name three tools that can be used for this technique.

12. The security administrator has noticed a rise in the number of unauthorized hosts appearing on your network. What two tools can be implemented so that they are notified when someone attaches a new host?

13. The security administrator has noticed that there has been an increase in the number of failed logins attempts on network-based computers. The account lockout policy allows three failed login attempts. What type of tool can they use for real-time monitoring of these events?

14. The CEO has written a new policy stating that all of the security logs on domain controllers are to be copied to a central location daily. These log files need to be secured to ensure that they have not been tampered with after collection. What action should the security administrator take to fulfill this policy?

15. When an attack on a host is made, a connection is established. Which two tools can capture the established connection so that the attacker can be identified?

16. What data format cannot be analyzed by any of the company's monitoring tools?

17. What are the three main components of a proxy server?

18. What is the purpose of a reverse proxy?

19. What technique does an iPhone use to send software updates to the phone?

20. What is the danger of someone taking an unauthorized smartphone into a research and development laboratory?

21. If I am using my personal phone as a BYOD device, what can be done to keep business data separate from my personal data?

22. What would be a safe, restricted, and contained environment that an IT team could provide to contractors to use?

23. What would I need to use in conjunction with a mobile device to limit the bandwidth being used when I download applications to the device?

24. If I want to use a third-party application on my carrier-locked iOS phone, what two stages should I perform to enable the application to run?

25. If I want to use a third-party application on my carrier-locked Android phone, what two stages should I perform to enable the application to run?

26. In what circumstances would I remote-wipe a device using the mobile device management system; (name two)?

27. The network administrator has been receiving support calls relating to the wireless access point. What tool should they use to diagnose the problem?

28. When the SSID of a wireless access point has been disabled, what two types of devices can be used to discover the SSID?

29. When I was on holiday in Las Vegas, all of the pictures I submitted to Facebook had the location where the picture was taken. Which tool carried out the labeling of photographs?

30. Which tools can I use to see if the DLL files of an application have been altered or tampered with?

31. When setting up certificates on a mobile device, the administrator is receiving certificate trust errors. What two actions should the administrator carry out first?

32. A new employee was given a company laptop with the correct certificates installed. Two weeks later, they report to the IT team that they are getting trust errors with the certificates. What has the new employee done to cause this error?

33. A salesperson cannot get internet access on their laptop, so they connect their 4G phone to the laptop to provide internet access. What technique have they just used?

34. A security administrator has found that many company devices have been tampered with over the past week. When they have looked into the security log files, they found that nothing out of the ordinary had been recorded. What has been tampering with the equipment?

35. A retailer wants to allow its customers to use a wireless payment method to pay for small transactions. What payment method must the customer adopt?

36. An audit has been carried out against the assets held by the IT team and the auditor has found that the company owns 300 Windows 10 licenses, but the software has been installed on 302 laptops. What is this violation known as?

37. A small company is going to purchase a firewall and needs to ensure that the firewall is an all-in-one device providing more protection than just simply being a firewall. What type of firewall would you recommend that they purchase?

38. A security administrator has found that remote users have been infecting the company network with viruses. What tool do they need to implement to mitigate this risk?

39. The security team has discovered that an attacker has been logging in twice to each machine but a security alert has not been logged as the company has an account lockout threshold of three attempts. What type of system should the company implement to alert them of any re-occurrence of this event?

40. What type of system does the security administrator need to implement to prevent anyone from emailing out credit card information?

41. What type of security technology can prevent a hacker from accessing a computer's registry remotely?

42. What common security issue reduces the amount of bandwidth available to the company coupled with reducing the amount of disk space available on a computer?

43. What security technology can be implemented on a virtual machine to protect it against attacks?

44. What security technology only allows approved applications to run on a system? How does it work?

45. Why would a security administrator archive security logs onto a WORM drive?

46. What type of security technology would an administrator implement to protect a web server's applications and data?

47. What is the purpose of push notification services?

48. A security administrator wants to implement a Bluetooth type of technology that uses low power. What technology should he implement?

49. A company has suffered from an increase in the theft of its high-end laptops. What technology can be implemented to prevent such laptops from being stolen?

50. A security administrator has discovered that the incorrect authentication information has been used to access the network. What type of technology is the attacker using?