Sy0 501 questions - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Sy0 501 questions? On this page you'll find 46 study documents about Sy0 501 questions.
Page 3 out of 46 results
Sort by
-
Security Plus sy0-501| 78 questions| with complete solutions
- Exam (elaborations) • 6 pages • 2023
-
Available in package deal
-
- $9.49
- + learn more
acceptable use policy/rules of behavior CORRECT ANSWERS: agreed-upon principles set forth by a company to govern how the employees of that company may use resource such a computers and internet access. 
 
ALE CORRECT ANSWERS: annual loss expectancy - a calculation used to identify risks and calculate the expected loss each year 
 
ARO CORRECT ANSWERS: annualized rate of occurrence - a calculation of how often a threat will occur. For example, a threat that occurs once every five years has an ...
-
Threat, Attacks, & Vulnerabilities: Comitias Security+ SY0-501 FedVTE Course 142 Questions with Answers,100% CORRECT
- Exam (elaborations) • 19 pages • 2023
-
Available in package deal
-
- $12.99
- + learn more
Threat, Attacks, & Vulnerabilities: Comitias Security+ SY0-501 FedVTE Course 142 Questions with Answers 
 
 
Rootkits - CORRECT ANSWER Programs that have the ability to hide themselves and cover traces of a hacker's activities from the user and potentially the operating system. 
 
Primary purpose of Rootkits - CORRECT ANSWER To provide repeated, undetected access to a system. 
 
Allows hackers to continually use a system without the adminstrator's knowledge. 
 
User Mode Rootkit - CORRECT ANSW...
-
CompTIA Security+ SY0-501 Test Bank 1 questions with complete solutions
- Exam (elaborations) • 4 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
Authentication CORRECT ANSWERS: When a person's identity is established with proof and confirmed by a system 
 
Authorization CORRECT ANSWERS: When a user is given access to certain data or areas of a building 
 
Accounting CORRECT ANSWERS: The tracking of data, computer usage, and network resources 
 
What is information security? CORRECT ANSWERS: A. Information security (also called computer security) is the act of protecting data and information from unauthorized access, unlawful modific...
-
CompTIA Security+ SY0-501 Chapter 1 questions with complete solutions
- Exam (elaborations) • 3 pages • 2023
-
Available in package deal
-
- $6.49
- + learn more
What is malware? CORRECT ANSWERS: malicious software 
 
What are the types and methods of Malware? CORRECT ANSWERS: 1. Viruses 
2. Crypto-malware, Ransomware 
3. Worms 
4. Trojan Horse 
5. Rootkit 
6. Keylogger 
7. Adware/Spyware 
8. Botnet 
 
What is the CIA of computer security? CORRECT ANSWERS: 1. Confidentiality 
2. Integrity 
3. Availability 
 
What is the AAA of computer security? CORRECT ANSWERS: 1. Authentication 
2. Authorization 
3. Accounting 
 
Organization uses the CIA principle...
-
CompTIA Security+ SY0-501 Chapter 3 questions with complete solutions
- Exam (elaborations) • 2 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
What is HIDS? CORRECT ANSWERS: Host-based Intrusion Detection System 
 
What is a personal firewall? CORRECT ANSWERS: an application that protects an individual computer from unwanted Internet traffic, by way of a set of rules and policies 
 
What is a pop-up blocker? CORRECT ANSWERS: An application/add-on on a web browser that blocks pop-up windows that usually contain advertisements 
 
What is ad filtering? CORRECT ANSWERS: Pop-up blocking 
 
What are content filters? CORRECT ANSWERS: Ind...
Get paid weekly? You can!
-
CompTIA Security+ SY0-501 - Cloud Security questions with complete solutions
- Exam (elaborations) • 2 pages • 2023
-
Available in package deal
-
- $7.99
- + learn more
Cloud Computing CORRECT ANSWERS: A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually 
 
Hyperconvergence CORRECT ANSWERS: Allows providers to fully integrate the storage, network, and servers 
 
VDI CORRECT ANSWERS: Virtual Desktop Infrastructure. Allows a provider to offer a full desktop OS to a user from a centralized server 
 
Secure Enclave CORRECT ANSWERS: Utilizes to distinct areas where data can be stor...
-
CompTIA Security+ (SY0-501) Multiple Choice Questions 2018 With Correct Answers!!
- Exam (elaborations) • 48 pages • 2022
-
- $21.99
- + learn more
You're the chief security contact for MTS. One of your Primary tasks is to document everything related to security and create a manual that can be used to manage the company in your absence. Which documents should be referenced in your manual as the ones that identify the methods used to accomplish a given task? 
 
A. Policies 
B. Standards 
C. Guidelines 
D. BIA 
C. Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than policies or standards. 
 
 
 
Con...
-
CompTIA Security+ (SY0-501) Multiple Choice Questions 2022 | 240 Questions with 100% Correct Answers
- Exam (elaborations) • 47 pages • 2022
- Available in package deal
-
- $12.49
- + learn more
You're the chief security contact for MTS. One of your Primary tasks is to document 
everything related to security and create a manual that can be used to manage the 
company in your absence. Which documents should be referenced in your manual as 
the ones that identify the methods used to accomplish a given task? 
A. Policies 
B. Standards 
C. Guidelines 
D. BIA - C. Guidelines help clarify processes to maintain standards. Guidelines tend 
to be less formal than policies or standards. 
Consid...
-
Threat, Attacks, & Vulnerabilities: Comitias Security+ SY0-501 FedVTE Course 142 Questions with Answers,100% CORRECT
- Exam (elaborations) • 19 pages • 2023
-
Available in package deal
-
- $12.49
- + learn more
Threat, Attacks, & Vulnerabilities: Comitias Security+ SY0-501 FedVTE Course 142 Questions with Answers 
 
 
Rootkits - CORRECT ANSWER Programs that have the ability to hide themselves and cover traces of a hacker's activities from the user and potentially the operating system. 
 
Primary purpose of Rootkits - CORRECT ANSWER To provide repeated, undetected access to a system. 
 
Allows hackers to continually use a system without the adminstrator's knowledge. 
 
User Mode Rootkit - CORRECT ANSW...
-
CompTIA Security + (SY0-501)| 193 questions| with complete solutions
- Exam (elaborations) • 89 pages • 2023
-
- $9.99
- + learn more
Explain SFTP CORRECT ANSWERS: SFTP or Secure FTP uses SSH to harden FTP. Uses SSH TCP Port 22. What is the difference between Recovery Time Objective and Recovery Point objective? CORRECT ANSWERS: Recovery Time Objective is the the target for how long it takes to get a system back online while... 
 
[Show more]
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia