Comptia security sy0 501 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Comptia security sy0 501? On this page you'll find 69 study documents about Comptia security sy0 501.
Page 3 out of 69 results
Sort by
-
Test Bank For CompTIA Security+ SY0-501 Cert Guide, Academic Edition 2nd Edition All Chapters - 9780134846057
- Exam (elaborations) • 90 pages • 2023
-
- $49.99
- + learn more
Test Bank For CompTIA Security+ SY0-501 Cert Guide, Academic Edition 2nd Edition All Chapters
-
CompTIA Security+ SY0-501 Glossary (full)| 519 questions| with complete solutions
- Exam (elaborations) • 40 pages • 2023
- Available in package deal
-
- $13.99
- + learn more
3DES CORRECT ANSWERS: Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks. 
 
AAA CORRECT ANSWERS: Authentication, authorization, and accounting. A group of technologies used in remote access systems. Authentication verifies a user's identification. Authorization determines if a user should have access. Accounting tracks a user's access with logs. Sometimes called AAAs of security...
-
CompTIA Security+ (SY0-501) Practice Exam| 303 questions| with complete solutions
- Exam (elaborations) • 72 pages • 2023
- Available in package deal
-
- $13.99
- + learn more
Which of the following should risk assessments be based upon as a best practice? 
 
A. A quantitative measurement of risk and impact and asset value 
 
B. An absolute measurement of threats 
 
C. A qualitative measurement of risk and impact 
 
D. A survey of annual loss and potential threats and asset value CORRECT ANSWERS: A. 
A quantitative measurement of risk and impact and asset value 
 
A risk management concept where operations resume at some capacity, despite the presence of a failure, i...
-
CompTIA Security+ (SY0-501) Multiple Choice| 240 Questions| 2023| with complete solutions
- Exam (elaborations) • 47 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
You're the chief security contact for MTS. One of your Primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task? 
 
A. Policies 
B. Standards 
C. Guidelines 
D. BIA CORRECT ANSWERS: C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or stan...
-
CompTIA Security+ (SY0-501) Multiple Choice Questions 2022 | 240 Questions with 100% Correct Answers
- Exam (elaborations) • 47 pages • 2023
- Available in package deal
-
- $17.49
- + learn more
You're the chief security contact for MTS. One of your Primary tasks is to document 
everything related to security and create a manual that can be used to manage the 
company in your absence. Which documents should be referenced in your manual as 
the ones that identify the methods used to accomplish a given task? 
A. Policies 
B. Standards 
C. Guidelines 
D. BIA - C. Guidelines help clarify processes to maintain standards. Guidelines tend 
to be less formal than policies or standards. 
Consid...
Get paid weekly? You can!
-
CompTIA Security + (SY0-501)| 193 questions| with complete solutions
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
Explain SFTP CORRECT ANSWERS: SFTP or Secure FTP uses SSH to harden FTP. Uses SSH TCP Port 22. 
 
What is the difference between Recovery Time Objective and Recovery Point objective? CORRECT ANSWERS: Recovery Time Objective is the the target for how long it takes to get a system back online while Recovery Point Objective is how far back the recovery needs to go (Example: Server backups contain can go back 1 month). 
 
What are the two purposes of a proxy? CORRECT ANSWERS: Filtering and monito...
-
CompTIA Security+ Study Guide: CompTIA Security+ SY0-501
- Exam (elaborations) • 178 pages • 2024
-
- $12.49
- + learn more
CompTIA Security+ Study Guide 
CompTIA Security+ SY0-501 
This is a 'Open Source Study Guide' for Security+ SY0-501, gathering as many information as possible from many 
sources on internet to ensure to cover all topics presented on exam. 
The second objective is to help you pass the exam without paying any expensive training courses
-
CompTIA Security+ (SY0-501) Objective 1| 125 questions| with complete solutions
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
Virus CORRECT ANSWERS: A piece of malicious code that replicates by attaching itself to another piece of executable code. Two types -- boot sector and program. 
 
Note that an Armored Virus employs encryption 
 
Crypto-malware CORRECT ANSWERS: An early name given to malware that encrypts files on a system and then leaves them unusable either permanently, acting as a denial of service, or temporarily until a ransom is paid. 
 
EX: WannaCry was an example of this 
 
Ransomware CORRECT ANSWERS: ...
-
CompTIA Security+ Certification Exam SY0-501 Practice Test 20
- Exam (elaborations) • 8 pages • 2023
-
- $10.99
- + learn more
A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies? 
 
Answers: 
 
- Data labeling policy 
 
- Clean desk policy 
 
- Acceptable Use Policy (AUP) 
 
- User account policy - Answer- - Clean desk policy 
 
A legal contract between the holder of confidential information and another person to whom that information is disclosed, prohibiting that other person from disclosing the confidential information to any other party is known as...
-
CompTIA Security+ SY0-501 Glossary (full)Latest 2022
- Exam (elaborations) • 39 pages • 2022
-
- $21.49
- + learn more
3DES 
Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks. 
 
 
 
AAA 
Authentication, authorization, and accounting. A group of technologies used in remote access systems. Authentication verifies a user's identification. Authorization determines if a user should have access. Accounting tracks a user's access with logs. Sometimes called AAAs of security. 
 
 
 
ABAC 
Attribute-based...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia