Comptia security sy0 501 - Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about Comptia security sy0 501? On this page you'll find 68 study documents about Comptia security sy0 501.

Page 4 out of 68 results

Sort by

CompTIA SY0-501 CompTIA SY0-501 Exam Actual Questions Exam
  • CompTIA SY0-501 CompTIA SY0-501 Exam Actual Questions Exam

  • Exam (elaborations) • 14 pages • 2023
  • CompTIA SY0-501 CompTIA SY0-501 Exam Actual Questions Exam CompTIA SY0-501 CompTIA SY0-501 Exam Actual Questions Exam When identifying a company's most valuable assets as part of a BIA, which of the following should be the FIRST priority? A. Life B. Intellectual property C. Sensitive data D. Public reputation A. Life A company's user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a work...
    (0)
  • $13.99
  • + learn more
CompTIA Security+ SY0-501 Test Bank 1 questions with complete solutions
  • CompTIA Security+ SY0-501 Test Bank 1 questions with complete solutions

  • Exam (elaborations) • 4 pages • 2023
  • Available in package deal
  • Authentication CORRECT ANSWERS: When a person's identity is established with proof and confirmed by a system Authorization CORRECT ANSWERS: When a user is given access to certain data or areas of a building Accounting CORRECT ANSWERS: The tracking of data, computer usage, and network resources What is information security? CORRECT ANSWERS: A. Information security (also called computer security) is the act of protecting data and information from unauthorized access, unlawful modific...
    (0)
  • $8.49
  • + learn more
CompTIA Security+ (SY0-501) Multiple Choice Questions 2018 With Correct Answers!!
  • CompTIA Security+ (SY0-501) Multiple Choice Questions 2018 With Correct Answers!!

  • Exam (elaborations) • 48 pages • 2022
  • You're the chief security contact for MTS. One of your Primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task? A. Policies B. Standards C. Guidelines D. BIA C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards. Con...
    (0)
  • $21.99
  • + learn more
CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
  • CompTIA Security+ SY0-501: Troubleshooting Common Security Issues

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • Which option is not a well-known personal cloud service? CORRECT ANSWERS: Kali. Which system should be used in medium to larger organizations to manage mobile app software? CORRECT ANSWERS: MDM. Which statement is false concerning personnel issues? CORRECT ANSWERS: Safely terminate employees through e-mail or sms whenever possible. Reduction in baseline deviation can be accomplished by using disk quotas, provisioned service usage quotas, and acceptable use policies. Select if this i...
    (0)
  • $6.49
  • + learn more
CompTIA Security+ SY0-501 Chapter 1 questions with complete solutions
  • CompTIA Security+ SY0-501 Chapter 1 questions with complete solutions

  • Exam (elaborations) • 3 pages • 2023
  • Available in package deal
  • What is malware? CORRECT ANSWERS: malicious software What are the types and methods of Malware? CORRECT ANSWERS: 1. Viruses 2. Crypto-malware, Ransomware 3. Worms 4. Trojan Horse 5. Rootkit 6. Keylogger 7. Adware/Spyware 8. Botnet What is the CIA of computer security? CORRECT ANSWERS: 1. Confidentiality 2. Integrity 3. Availability What is the AAA of computer security? CORRECT ANSWERS: 1. Authentication 2. Authorization 3. Accounting Organization uses the CIA principle...
    (0)
  • $6.49
  • + learn more
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
  • CompTIA Security+ SY0-501: Secure System and Application Design and Deployment

  • Exam (elaborations) • 3 pages • 2023
  • Available in package deal
  • Which device relieves the CPU from encryption and decryption processing? A. HSM B. TPM C. SSL D. SED CORRECT ANSWERS: A. HSM A technician installs a Linux virtual machine from the installation media and then applies the latest operating system patches. What else should be done to harden the installation? A. Configure a host-based firewall B. Rename the administrator account C. Disable unnecessary services D. Patch the installation CORRECT ANSWERS: A. Configure a host-based fire...
    (0)
  • $8.49
  • + learn more
CompTIA Security+ SY0-501 - Cloud Security questions with complete solutions
  • CompTIA Security+ SY0-501 - Cloud Security questions with complete solutions

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • Cloud Computing CORRECT ANSWERS: A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually Hyperconvergence CORRECT ANSWERS: Allows providers to fully integrate the storage, network, and servers VDI CORRECT ANSWERS: Virtual Desktop Infrastructure. Allows a provider to offer a full desktop OS to a user from a centralized server Secure Enclave CORRECT ANSWERS: Utilizes to distinct areas where data can be stor...
    (0)
  • $7.99
  • + learn more
CompTIA Security + SY0-501: Identity Concepts and Access Services
  • CompTIA Security + SY0-501: Identity Concepts and Access Services

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • Which client-server protocol enables a remote access server to communicate with a central server to authenticate dial-in users and authorize their access to systems? CORRECT ANSWERS: RADIUS Which Kerberos-trusted third party service, familiar with all systems and trusted by all, guarantees privacy and data integrity? CORRECT ANSWERS: KDC Which statement is not true about OAuth 2.0? CORRECT ANSWERS: It is a proprietary framework that allows any application complete access to an HTTPS ser...
    (0)
  • $8.49
  • + learn more
CompTIA Security+ SY0-501 Chapter 3 questions with complete solutions
  • CompTIA Security+ SY0-501 Chapter 3 questions with complete solutions

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • What is HIDS? CORRECT ANSWERS: Host-based Intrusion Detection System What is a personal firewall? CORRECT ANSWERS: an application that protects an individual computer from unwanted Internet traffic, by way of a set of rules and policies What is a pop-up blocker? CORRECT ANSWERS: An application/add-on on a web browser that blocks pop-up windows that usually contain advertisements What is ad filtering? CORRECT ANSWERS: Pop-up blocking What are content filters? CORRECT ANSWERS: Ind...
    (0)
  • $8.49
  • + learn more
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
  • CompTIA Security+ SY0-501: Secure System and Application Design and Deployment

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • Which development tool features tracks code changes? CORRECT ANSWERS: Version control. You team is developing a secured web service. What should be established to detect deviations from normal configurations that can affect security. CORRECT ANSWERS: Secure Baseline. A technician installs a Linux virtual machine from the installation media and then applies the latest operating system patches. What else should be done to harden the installation? CORRECT ANSWERS: Disable unnecessary s...
    (0)
  • $7.99
  • + learn more