⚡️Lightning Sale: 25% off Lifetime Membership ⚡️

20 hours, 31 minutes remaining!
CompTIA Study Materials
AWS Study Materials
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900
Content out of date!

These study materials are for an old exam version. Click here for the up to date study materials!

Free CompTIA Security+ SY0-501 Practice Test

Prepare for the CompTIA Security+ SY0-501 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 5
  • Time: 60 seconds per question (0 hours, 5 minutes, 0 seconds)
  • Included Objectives:
    • Threats, Attacks and Vulnerabilities
    • Technologies and Tools
    • Architecture and Design
    • Identity and Access Management
    • Risk Management
    • Cryptography and PKI

Which of the following options is a vendor neutral standard for message logging?

  • Event manager

  • syslog

  • SNMP

  • SIEM

Your bank has contacted you and informed you they recognized an unusual login with your username and password on their website. As a precaution they have locked your account and stated the login came from a foreign country. You run a security scan on your PC which finds malware. The description of the malware states that it intercepts normal web traffic from your browser executable. What type of attack best describes this?

  • Domain hijacking

  • Man-in-the-browser

  • Consensus attack

  • Amplification

During routine security checks you discover that a wireless access point is setup on the outside of your employer's office building. The access point has the same SSID as the internal WiFi network but is unsecured to allow anyone access. What type of attack have you discovered?

  • Evil twin

  • Jamming

  • SSID reduplication attack

  • W-DNS Spoofing

What type of DOS attack sends a large number of new TCP requests to a server in order to overwhelm it with unused open sessions?

  • SYN Flood

  • Spanning tree

  • Session hijacking

  • DDoS

You are an IT specialist on the Network Security team of a large enterprise. You have been tasked to implement a wireless network to be used by employees in the corporate headquarters. Your employer is very security conscious and instructs you to use the best possible encryption protocol available. What 802.11 protocol would you use to fulfill this requirement?

  • WIFI-S

  • WPA2

  • WPA

  • SSH



Remaining Time 00:05:00