Book Image

CompTIA Security+ Practice Tests SY0-501

By : Ian Neil
Book Image

CompTIA Security+ Practice Tests SY0-501

By: Ian Neil

Overview of this book

CompTIA Security+ is a core security certification that will validate your baseline skills for a career in cybersecurity. Passing this exam will not only help you identify security incidents but will also equip you to resolve them efficiently. This book builds on the popular CompTIA Security+ Certification Guide, which mirrors the SY0-501 exam pattern. This practice test-based guide covers all six domains of the Security+ SY0-501 exam: threats, attacks, and vulnerabilities; technologies and tools; architecture and design; identity and access management; cryptography and PKI; and risk management. You’ll take six mock tests designed as per the official Security+ certification exam pattern, each covering significant aspects from an examination point of view. For each domain, the book provides a dedicated cheat sheet that includes important concepts covered in the test. You can even time your tests to simulate the actual exam. These tests will help you identify gaps in your knowledge and discover answers to tricky exam questions. By the end of this book, you’ll have developed and enhanced the skills necessary to pass the official CompTIA Security+ exam.
Table of Contents (9 chapters)

Practice Test 7 – Drag and Drops – Technologies and Tools

I suggest using two different-colored pens: blue or black or answers that are easy for you to identify and a red or different-colored pen for answers that you are unsure of. This way, you can identify your strong and weak areas.

Place the answers into the relevant answer boxes in the following table, starting with the answers that you can easily identify. Make a list of those that you cannot answer on your first time through, as you need to revise those areas. Then use logic to answer the remaining questions.

Insert the phrases at the end of this section into the appropriate answer boxes in the following table. Each phrase can only be used once:

Description

Answers

Other than a firewall, what other device uses ACL?

Setting up a non-secure remote session to your LAN.

IPSec mode between two servers on your LAN.

Add an application, EXE, or a DLL so it will run.

The system does not detect an attack.

What will you do if a mobile phone is lost or stolen?

Prevent DNS poisoning by using DNSSEC. What records
are created?

On a firewall, the result when the traffic is not on the
allow rules.

Lets you monitor the attack methods used.

Used to protect PII and sensitive information from
leaving the company by email or USB.

A NIPS where all the traffic flows through it.

How to keep personal and business data separate on a
cell phone.

A tool that tells you the patch version of a web server.

A firewall that can also perform malware inspection.

IPSec mode in a site-to-site VPN.

A passive device that works with a NIPS.

A stolen Bluetooth phone used for texting your friends
and family.

A tool that can be used for banner grabbing.

Can be used instead of a motion sensor to detect motion.

Adding a third-party application to your phone.

How to protect a mobile telephone.

The system detects a virus but manual inspection
contradicts it.

Secure remote access protocol that can use a GUI to
access a router.

How you could block unwanted applications.

Used for secure transfer of data between two hosts.

Use the following options to answer the preceding questions:

Camera

Blacklist

TLS

False negative

Sideloading

DLP

Router

Remote wipe

SSH

Netcat

False positive

Implicit deny

Policy violation

Inline

Bluejacking

Tunnel mode

Banner grabbing

Honeypot

FDE, screen locks

Storage segmentation

NIDS

Transport mode

UTM

Whitelist

RRSIG