Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

SY0-501Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 201

A security guard has informed the Chief Information Security Officer that a person with a tablet has been walking around the building. The guard also noticed strange white markings in different areas of the parking lot.
The person is attempting which of the following types of attacks?

  • A: Jamming
  • B: War chalking
  • C: Packet sniffing
  • D: Near field communication

Question 202

A system administrator is configuring a site-to-site VPN tunnel.
Which of the following should be configured on the VPN concentrator during the IKE phase?

  • A: RIPEMD
  • B: ECDHE
  • C: Diffie-Hellman
  • D: HTTPS

Question 203

A network operations manager has added a second row of server racks in the datacenter. These racks face the opposite direction of the first row of racks.
Which of the following is the reason the manager installed the racks this way?

  • A: To lower energy consumption by sharing power outlets
  • B: To create environmental hot and cold isles
  • C: To eliminate the potential for electromagnetic interference
  • D: To maximize fire suppression capabilities

Question 204

Phishing emails frequently take advantage of high-profile catastrophes reported in the news.
Which of the following principles BEST describes the weakness being exploited?

  • A: Intimidation
  • B: Scarcity
  • C: Authority
  • D: Social proof

Question 205

New magnetic locks were ordered for an entire building. In accordance with company policy, employee safety is the top priority.
In case of a fire where electricity is cut, which of the following should be taken into consideration when installing the new locks?

  • A: Fail safe
  • B: Fault tolerance
  • C: Fail secure
  • D: Redundancy

Question 206

Anne, the Chief Executive Officer (CEO), has reported that she is getting multiple telephone calls from someone claiming to be from the helpdesk. The caller is asking to verify her network authentication credentials because her computer is broadcasting across the network.
This is MOST likely which of the following types of attacks?

  • A: Vishing
  • B: Impersonation
  • C: Spim
  • D: Scareware

Question 207

Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Choose two.)

  • A: Password expiration
  • B: Password length
  • C: Password complexity
  • D: Password history
  • E: Password lockout

Question 208

An administrator discovers the following log entry on a server:
Nov 12 2013 00:23:45 httpd[2342]: GET
/app2/prod/proc/process.php?input=change;cd%20../../../etc;cat%20shadow
Which of the following attacks is being attempted?

  • A: Command injection
  • B: Password attack
  • C: Buffer overflow
  • D: Cross-site scripting

Question 209

A security team wants to establish an Incident Response plan. The team has never experienced an incident.
Which of the following would BEST help them establish plans and procedures?

  • A: Table top exercises
  • B: Lessons learned
  • C: Escalation procedures
  • D: Recovery procedures

That’s the end of your free questions

You’ve reached the preview limit for SY0-501

Consider upgrading to gain full access!

Page 9 of 42 • Questions 201-225 of 1043

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!