Master the SY0-501 CompTIA Security+ content and be ready for exam day success quickly with this Exambible SY0-501 exam engine. We guarantee it!We make it a reality and give you real SY0-501 questions in our CompTIA SY0-501 braindumps.Latest 100% VALID CompTIA SY0-501 Exam Questions Dumps at below page. You can use our CompTIA SY0-501 braindumps and pass your exam.

Q17. Malicious traffic from an internal network has been detected on an unauthorized port on an application server.

Which of the following network-based security controls should the engineer consider implementing?

A. ACLs

B. HIPS

C. NAT

D. MAC filtering

Answer: A


Q18. A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?

A. Botnet

B. Ransomware

C. Polymorphic malware

D. Armored virus

Answer: A


Q19. Which of the following encryption methods does PKI typically use to securely project keys?

A. Elliptic curve

B. Digital signatures

C. Asymmetric

D. Obfuscation

Answer: B


Q20. An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?

A. Capture and document necessary information to assist in the response.

B. Request the user capture and provide a screenshot or recording of the symptoms.

C. Use a remote desktop client to collect and analyze the malware in real time.

D. Ask the user to back up files for later recovery.

Answer: C


Q21. Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)

A. Password expiration

B. Password length

C. Password complexity

D. Password history

E. Password lockout

Answer: A,D


Q22. A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?

A. Deterrent

B. Preventive

C. Detective

D. Compensating

Answer: A


Q23. When trying to log onto a company’s new ticketing system, some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?

A. Network resources have been exceeded.

B. The software is out of licenses.

C. The VM does not have enough processing power.

D. The firewall is misconfigured.

Answer: C


Q24. When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:

A. system sprawl

B. end-of-life systems

C. resource exhaustion

D. a default configuration

Answer: B