CompTIA Security+ SY0-501 (Practice Test)

CompTIA+ Security+ is a vendor neutral IT industry certification for security. It is an entry level certificate for the subject of IT security and is recommended to be the first security focused certificate an IT professional should learn. Security+ will establish core knowledge that would be required for any cyber-security role by covering essential skills in the areas of Threats, Attacks & Vulnerabilities, Technologies & Tools, Architecture & Design, Identity & Access Management, Risk Management & Cryptography and PKI.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)
  • Included Objectives:
    • Technologies and Tools
    • Architecture and Design
    • Identity and Access Management
    • Risk Management
    • Cryptography and PKI
    • Threats, Attacks and Vulnerabilities

What type of certificate can be used for a list of explicitly given domains, IP addresses or sub domains?

  • Code signed
  • Self signed
  • SAN
  • Wildcard

Which regulation in the United States would apply to a healthcare organization and require they protect the confidentially of patient data?

  • GDPR
  • EU Privacy Shield
  • HDPA

When configuring a wireless access point what configuration change will hide the name of the wireless network and require users who want to connect to the network to know the wireless name?

  • Disable SSID
  • Enable DLP on the access point
  • Disable passive network name authentication
  • Enable WPA2's anonymous mode

You are conducting a penetration test on a web application recently purchased by the HR department of your employer. You find that when creating a new user account in the Web UI you can delete data from the database by entering '; DROP TABLE Users' into the field for the user account. What type of vulnerability have you discovered?

  • XML Injection
  • SQL injection
  • Drop database vulnerability
  • Request forgery

You are a penetration tester for a network security consulting company. You are currently on-site at a customer's premises and are doing your first analysis of the customer's network security. You check if they are using Wifi and find that they are using a deprecated protocol with known vulnerabilities. Which of the options is most likely being used?

  • WPA2
  • 805.99 b
  • WEP
  • 802.1X

You are a member of the security team in the IT Infrastructure department at a manufacturer. You have received a ticket from the network architecture team who have requested your approval of a proposed network change. The change is to replace a network device that allows internal servers to make requests to the internet without external systems being able to determine what internal server made the original request. What type of system is being changed?

  • Router
  • Switch
  • Firewall
  • Proxy

You have joined a new enterprise as a member of the IT Security team. During on boarding you receive two computers, one with access to highly confidential systems and one with access to less critical data and the internet. You cannot send data or documents from one network to the other and have to manage separate credentials for each. What concept best defines this approach?

  • VPN
  • Data aggregated network segmentation (DANS)
  • Physical de-segmentation
  • Air gap

What is the name of the process used to digitally sign executables?

  • Code signing
  • Code pinning
  • Code validation signature
  • Executable Signature Signing

What type of DOS attack sends a large number of new TCP requests to a server in order to overwhelm it with unused open sessions?

  • Session hijacking
  • SYN Flood
  • DDoS
  • Spanning tree

Your employer is planning to place wireless devices at the entrance of their retail locations. The devices will use WiFi to connect to the store's wireless network and use beams of light to detect when someone enters through the entrance. Other than WiFi, what type of wireless communication is being used?

  • NFC
  • Infrared
  • Bluetooth
  • 802.11

You are in the onboarding process with a new employer. Your new manager has asked you to review and sign a document that outlines how you can use their IT systems and what types of uses are not permitted. What type of policy document is this?

  • Acceptable use policy
  • Social media policy
  • Adverse actions policy
  • Email and access policy

Your bank has contacted you and informed you they recognized an unusual login with your username and password on their website. As a precaution they have locked your account and stated the login came from a foreign country. You run a security scan on your PC which finds malware. The description of the malware states that it intercepts normal web traffic from your browser executable. What type of attack best describes this?

  • Amplification
  • Man-in-the-browser
  • Consensus attack
  • Domain hijacking

A new company policy requires hardware encryption for certain highly confidential systems. These existing systems do not already have a hardware component that can provide this functionality. What is the easiest way to implement this new policy?

  • Trusted Platform Module
  • PKI
  • Hardware Security Module

Which of the following is used in PKI for key agreement?

  • ECDH
  • HMAC
  • CTR
  • RSA

A lazy programmer at a startup was recently fired for sleeping at their cubicle. Angry about being fired and wanting revenge, the programmer accessed the admin panel the startups website using a method they previously programmed into the application before being fired. With access to the admin panel the former employee was able to delete user account from the database which caused a lot of issues for the company. Which of the following options best describes the methodology of the attack?

  • Rootkit
  • Ransomware
  • Backdoor
  • SQL injection

What type of NIDS commonly uses artificial intelligence and data mining to identify malicious network traffic?

  • Anomaly-based NIDS
  • Signature-based NIDS
  • Rule-based NIDS
  • Filter-based NIDS

Your employer has several thousand internal users all who need to access the internet on a daily basis to complete their work. What technology should be used to mask the internal IP addresses of these users and allow access to the internet through shared public IP addresses?

  • DNS
  • NAT
  • DMZ
  • Router

You are observing an outage of your employers website. While investigating the cause of the outage you learn that there is a large-scale DDOS attack that has caused network outages for large percentages of the internet. The attack is targeting key infrastructure of major web service providers. According to news sources the attackers are sending huge numbers of requests to open DNS servers with spoofed IP addresses. The responses from the DNS servers are sent to the spoofed IP addresses which have resulted in network outages due to overwhelmed infrastructure. What type of attack is being conducted?

  • Domain hijacking
  • DNS jamming
  • DNS poisoning
  • DNS amplification

You have ordered a penetration test on the companies website from a 3rd party IT Security consultant. Your web administration team has created a stand-alone test network to ensure the penetration tests do not cause issues on the live website. Other than the IP address of the web server you have not provided the penetration testers with any information. What type of test best describes this scenario?

  • White box
  • Stand alone
  • Integration
  • Black box

Which option best describes the following situation: An attacker has intercepted network packets between a browser and web server. The attack then re-transmits the intercepted data to the web server hoping the server will respond with useful information (e.g. a session id, credit card information, etc.).

  • Replay
  • Injection
  • Cross-site scripting
  • Bluejacking

Remaining Time: