Sy0 501 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Sy0 501? On this page you'll find 93 study documents about Sy0 501.
Page 4 out of 93 results
Sort by
-
CompTIA Security+ (SY0-501) Multiple Choice Questions 2022 | 240 Questions with 100% Correct Answers
- Exam (elaborations) • 47 pages • 2023
- Available in package deal
-
- $17.49
- + learn more
You're the chief security contact for MTS. One of your Primary tasks is to document 
everything related to security and create a manual that can be used to manage the 
company in your absence. Which documents should be referenced in your manual as 
the ones that identify the methods used to accomplish a given task? 
A. Policies 
B. Standards 
C. Guidelines 
D. BIA - C. Guidelines help clarify processes to maintain standards. Guidelines tend 
to be less formal than policies or standards. 
Consid...
-
CompTIA Security+ Study Guide: CompTIA Security+ SY0-501
- Exam (elaborations) • 178 pages • 2024
-
- $12.49
- + learn more
CompTIA Security+ Study Guide 
CompTIA Security+ SY0-501 
This is a 'Open Source Study Guide' for Security+ SY0-501, gathering as many information as possible from many 
sources on internet to ensure to cover all topics presented on exam. 
The second objective is to help you pass the exam without paying any expensive training courses
-
CompTIA Security+ (SY0-501) Objective 1| 125 questions| with complete solutions
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
Virus CORRECT ANSWERS: A piece of malicious code that replicates by attaching itself to another piece of executable code. Two types -- boot sector and program. 
 
Note that an Armored Virus employs encryption 
 
Crypto-malware CORRECT ANSWERS: An early name given to malware that encrypts files on a system and then leaves them unusable either permanently, acting as a denial of service, or temporarily until a ransom is paid. 
 
EX: WannaCry was an example of this 
 
Ransomware CORRECT ANSWERS: ...
-
CompTIA Security+ SY0-501 Glossary (full)Latest 2022
- Exam (elaborations) • 39 pages • 2022
-
- $21.49
- + learn more
3DES 
Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks. 
 
 
 
AAA 
Authentication, authorization, and accounting. A group of technologies used in remote access systems. Authentication verifies a user's identification. Authorization determines if a user should have access. Accounting tracks a user's access with logs. Sometimes called AAAs of security. 
 
 
 
ABAC 
Attribute-based...
-
CompTIA Security+ Certification Exam SY0-501 Practice Test 20
- Exam (elaborations) • 8 pages • 2023
-
- $10.99
- + learn more
A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies? 
 
Answers: 
 
- Data labeling policy 
 
- Clean desk policy 
 
- Acceptable Use Policy (AUP) 
 
- User account policy - Answer- - Clean desk policy 
 
A legal contract between the holder of confidential information and another person to whom that information is disclosed, prohibiting that other person from disclosing the confidential information to any other party is known as...
Too much month left at the end of the money?
-
CompTIA Security + SY0-501
- Other • 3 pages • 2023
-
- $9.49
- + learn more
Port number of HTTP - Answer- TCP 80 
 
Port number of DNS Query - Answer- UDP 53 
 
Port number of DNS Zone Transfer - Answer- TCP 53 
 
Port number of HTTPS - Answer- TCP 443 
 
Port number of Secure POP - Answer- 995 
 
Port number of Secure IMAP - Answer- 993 
 
Port number of SSL/TLS - Answer- 443 
 
Port number of SFTP - Answer- 22 
 
Port number of LDAPS - Answer- 636 
 
Port number of SSH - Answer- 22 
 
Port number of SNMP - Answer- 161 
 
Key
-
CompTIA Security+ (SY0-501) – Cryptography(Solved)2022
- Exam (elaborations) • 14 pages • 2022
-
- $12.99
- + learn more
encryption 
A reversible process of converting data such that to a third party the data is nothing more than a random binary string. 
 
 
 
decryption 
Makes encrypted data readable. 
 
 
 
cryptography 
The science of encrypting and decrypting data. 
 
 
 
encryption 
The process of converting plaintext information into ciphertext information. 
 
 
 
plaintext 
Any form of easily readable binary data. 
 
 
 
ciphertext 
Any form of encrypted binary data. 
 
 
 
code 
A representation of an enti...
-
Security Plus sy0-501| 78 questions| with complete solutions
- Exam (elaborations) • 6 pages • 2023
- Available in package deal
-
- $9.49
- + learn more
acceptable use policy/rules of behavior CORRECT ANSWERS: agreed-upon principles set forth by a company to govern how the employees of that company may use resource such a computers and internet access. 
 
ALE CORRECT ANSWERS: annual loss expectancy - a calculation used to identify risks and calculate the expected loss each year 
 
ARO CORRECT ANSWERS: annualized rate of occurrence - a calculation of how often a threat will occur. For example, a threat that occurs once every five years has an ...
-
Comptia Security+ SY0-501 (FedVTE): Risk Management
- Other • 13 pages • 2023
-
- $12.49
- + learn more
Security Policy Awareness Purpose - Answer- To enhance security by: 
- Improving awareness of the need to protect system resources 
- Developing skills/knowledge so computer uses can perform their jobs more securely 
 
End User Training - Answer- - Purpose, explanation, importance of adhering to security policy/procedures 
- Training should be initial, periodic, and ongoing 
 
Role Based Training - Answer- Specialized training that is customized to the specific role that an employee holds in the...
-
Threat, Attacks, & Vulnerabilities: Comitias Security+ SY0-501 FedVTE Course 142 Questions with Answers,100% CORRECT
- Exam (elaborations) • 19 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
Threat, Attacks, & Vulnerabilities: Comitias Security+ SY0-501 FedVTE Course 142 Questions with Answers 
 
 
Rootkits - CORRECT ANSWER Programs that have the ability to hide themselves and cover traces of a hacker's activities from the user and potentially the operating system. 
 
Primary purpose of Rootkits - CORRECT ANSWER To provide repeated, undetected access to a system. 
 
Allows hackers to continually use a system without the adminstrator's knowledge. 
 
User Mode Rootkit - CORRECT ANSW...
$6.50 for your textbook summary multiplied by 100 fellow students... Do the math: that's a lot of money! Don't be a thief of your own wallet and start uploading yours now. Discover all about earning on Stuvia