CompTIA Security+ SY0 501
Liberty University
All 11 results
Sort by
![CompTIA Security+ SY0-501 Test Bank 1 questions with complete solutions](/docpics/63d23ce0c0854_2301933.jpg)
-
CompTIA Security+ SY0-501 Test Bank 1 questions with complete solutions
- Exam (elaborations) • 4 pages • 2023
- Available in package deal
-
- $8.49
- + learn more
Authentication CORRECT ANSWERS: When a person's identity is established with proof and confirmed by a system 
 
Authorization CORRECT ANSWERS: When a user is given access to certain data or areas of a building 
 
Accounting CORRECT ANSWERS: The tracking of data, computer usage, and network resources 
 
What is information security? CORRECT ANSWERS: A. Information security (also called computer security) is the act of protecting data and information from unauthorized access, unlawful modific...
![CompTIA Security+ (SY0-501) Practice Exam| 303 questions| with complete solutions](/docpics/63d23bb7e1583_2301918.jpg)
-
CompTIA Security+ (SY0-501) Practice Exam| 303 questions| with complete solutions
- Exam (elaborations) • 72 pages • 2023
- Available in package deal
-
- $13.99
- + learn more
Which of the following should risk assessments be based upon as a best practice? 
 
A. A quantitative measurement of risk and impact and asset value 
 
B. An absolute measurement of threats 
 
C. A qualitative measurement of risk and impact 
 
D. A survey of annual loss and potential threats and asset value CORRECT ANSWERS: A. 
A quantitative measurement of risk and impact and asset value 
 
A risk management concept where operations resume at some capacity, despite the presence of a failure, i...
![CompTIA Security+ SY0-501 Glossary (full)| 519 questions| with complete solutions](/docpics/63d23a4c8f8af_2301903.jpg)
-
CompTIA Security+ SY0-501 Glossary (full)| 519 questions| with complete solutions
- Exam (elaborations) • 40 pages • 2023
- Available in package deal
-
- $13.99
- + learn more
3DES CORRECT ANSWERS: Triple Digital Encryption Standard. A symmetric algorithm used to encrypt data and provide confidentiality. It is a block cipher that encrypts data in 64-bit blocks. 
 
AAA CORRECT ANSWERS: Authentication, authorization, and accounting. A group of technologies used in remote access systems. Authentication verifies a user's identification. Authorization determines if a user should have access. Accounting tracks a user's access with logs. Sometimes called AAAs of security...
![CompTIA Security+ SY0-501: Secure System and Application Design and Deployment](/docpics/63d239d0b60ce_2301895.jpg)
-
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
- Exam (elaborations) • 3 pages • 2023
- Available in package deal
-
- $8.49
- + learn more
Which device relieves the CPU from encryption and decryption processing? 
 
A. HSM 
B. TPM 
C. SSL 
D. SED CORRECT ANSWERS: A. HSM 
 
A technician installs a Linux virtual machine from the installation media and then applies the latest operating system patches. 
What else should be done to harden the installation? 
 
A. Configure a host-based firewall 
B. Rename the administrator account 
C. Disable unnecessary services 
D. Patch the installation CORRECT ANSWERS: A. Configure a host-based fire...
![CompTIA Security+ (SY0-501) Multiple Choice| 240 Questions| 2023| with complete solutions](/docpics/63d2391d06d83_2301882.jpg)
-
CompTIA Security+ (SY0-501) Multiple Choice| 240 Questions| 2023| with complete solutions
- Exam (elaborations) • 47 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
You're the chief security contact for MTS. One of your Primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task? 
 
A. Policies 
B. Standards 
C. Guidelines 
D. BIA CORRECT ANSWERS: C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or stan...
![CompTIA Security+ SY0-501: Secure System and Application Design and Deployment](/docpics/63d236c838971_2301848.jpg)
-
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Which development tool features tracks code changes? CORRECT ANSWERS: Version control. 
 
You team is developing a secured web service. 
What should be established to detect deviations from normal configurations that can affect security. CORRECT ANSWERS: Secure Baseline. 
 
A technician installs a Linux virtual machine from the installation media and then applies the latest operating system patches. 
 What else should be done to harden the installation? CORRECT ANSWERS: Disable unnecessary s...
![CompTIA Security+ SY0-501 Chapter 3 questions with complete solutions](/docpics/63d23345245ac_2301793.jpg)
-
CompTIA Security+ SY0-501 Chapter 3 questions with complete solutions
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $8.49
- + learn more
What is HIDS? CORRECT ANSWERS: Host-based Intrusion Detection System 
 
What is a personal firewall? CORRECT ANSWERS: an application that protects an individual computer from unwanted Internet traffic, by way of a set of rules and policies 
 
What is a pop-up blocker? CORRECT ANSWERS: An application/add-on on a web browser that blocks pop-up windows that usually contain advertisements 
 
What is ad filtering? CORRECT ANSWERS: Pop-up blocking 
 
What are content filters? CORRECT ANSWERS: Ind...
![CompTIA Security+ SY0-501 Chapter 1 questions with complete solutions](/docpics/63d2312547a63_2301776.jpg)
-
CompTIA Security+ SY0-501 Chapter 1 questions with complete solutions
- Exam (elaborations) • 3 pages • 2023
- Available in package deal
-
- $6.49
- + learn more
What is malware? CORRECT ANSWERS: malicious software 
 
What are the types and methods of Malware? CORRECT ANSWERS: 1. Viruses 
2. Crypto-malware, Ransomware 
3. Worms 
4. Trojan Horse 
5. Rootkit 
6. Keylogger 
7. Adware/Spyware 
8. Botnet 
 
What is the CIA of computer security? CORRECT ANSWERS: 1. Confidentiality 
2. Integrity 
3. Availability 
 
What is the AAA of computer security? CORRECT ANSWERS: 1. Authentication 
2. Authorization 
3. Accounting 
 
Organization uses the CIA principle...
![CompTIA Security+ (SY0-501) Objective 1| 125 questions| with complete solutions](/docpics/63d23c66cb599_2301925.jpg)
-
CompTIA Security+ (SY0-501) Objective 1| 125 questions| with complete solutions
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
Virus CORRECT ANSWERS: A piece of malicious code that replicates by attaching itself to another piece of executable code. Two types -- boot sector and program. 
 
Note that an Armored Virus employs encryption 
 
Crypto-malware CORRECT ANSWERS: An early name given to malware that encrypts files on a system and then leaves them unusable either permanently, acting as a denial of service, or temporarily until a ransom is paid. 
 
EX: WannaCry was an example of this 
 
Ransomware CORRECT ANSWERS: ...
![CompTIA Security+ SY0-501 - Cloud Security questions with complete solutions](/docpics/63d23afd2ee54_2301910.jpg)
-
CompTIA Security+ SY0-501 - Cloud Security questions with complete solutions
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Cloud Computing CORRECT ANSWERS: A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually 
 
Hyperconvergence CORRECT ANSWERS: Allows providers to fully integrate the storage, network, and servers 
 
VDI CORRECT ANSWERS: Virtual Desktop Infrastructure. Allows a provider to offer a full desktop OS to a user from a centralized server 
 
Secure Enclave CORRECT ANSWERS: Utilizes to distinct areas where data can be stor...
![Verkoop je kennis op stuvia](https://www.stuvia.com/hosted-imgs/app/stock-fotos/banner_seller_big.jpg)
$6.50 for your textbook summary multiplied by 100 fellow students... Do the math: that's a lot of money! Don't be a thief of your own wallet and start uploading yours now. Discover all about earning on Stuvia