CompTIA Security+ Practice Tests SY0-501
eBook - ePub

CompTIA Security+ Practice Tests SY0-501

Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam

Ian Neil

  1. 252 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

CompTIA Security+ Practice Tests SY0-501

Practice tests in 4 different formats and 6 cheat sheets to help you pass the CompTIA Security+ exam

Ian Neil

Book details
Book preview
Table of contents
Citations

About This Book

Learn from Ian Neil, one of the world's top CompTIA Security+ trainers in the world, and enhance your analytical skills to pass the CompTIA Security+ SY0-501 exam

Key Features

  • Become a pro at answering questions from all six of the domains of the SY0-501 exam
  • Learn about cryptography algorithms, security policies, and their real-world implementations
  • Solve practice tests that complement the official CompTIA Security+ certification exam

Book Description

CompTIA Security+ is a core security certification that will validate your baseline skills for a career in cybersecurity. Passing this exam will not only help you identify security incidents but will also equip you to resolve them efficiently. This book builds on the popular CompTIA Security+ Certification Guide, which mirrors the SY0-501 exam pattern.

This practice test-based guide covers all six domains of the Security+ SY0-501 exam: threats, attacks, and vulnerabilities; technologies and tools; architecture and design; identity and access management; cryptography and PKI; and risk management. You'll take six mock tests designed as per the official Security+ certification exam pattern, each covering significant aspects from an examination point of view. For each domain, the book provides a dedicated cheat sheet that includes important concepts covered in the test. You can even time your tests to simulate the actual exam. These tests will help you identify gaps in your knowledge and discover answers to tricky exam questions.

By the end of this book, you'll have developed and enhanced the skills necessary to pass the official CompTIA Security+ exam.

What you will learn

  • Understand how prepared you are for the CompTIA Security+ certification
  • Identify different types of security threats, attacks, and vulnerabilities
  • Explore identity and access management in an enterprise environment
  • Protect your business tools and platforms from cyberattacks
  • Create and maintain a secure network
  • Understand how you can protect your data
  • Discover encryption techniques required to protect against various cyber threat scenarios

Who this book is for

If you are a security administrator, a system or network administrator, or anyone who wants to pass the CompTIA Security+ exam, this book is for you. This book is an ideal resource for students who want a career or degree in cybersecurity or are studying for the CISSP certification exam.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is CompTIA Security+ Practice Tests SY0-501 an online PDF/ePUB?
Yes, you can access CompTIA Security+ Practice Tests SY0-501 by Ian Neil in PDF and/or ePUB format, as well as other popular books in Ciencia de la computación & Guías de certificación en ciencias computacionales. We have over one million books available in our catalogue for you to explore.
Assessment

Chapter 1: Threats, Attacks, and Vulnerabilities Practice Tests

Practice Test 1 – Solution

1. A polymorphic virus mutates as it replicates, therefore, the hash value will keep changing.
2. A backdoor is put into an application by a programmer so that if the user locks themselves out, they can gain access to the application. A backdoor attack is where they use this password that has been in place since the application was created.
3. The attack here is launched by telephone; therefore, it is a vishing attack.
4. Letting a fireman into your server room is a social engineering urgency attack; if you don't let him in, your building could burn down.
5. This is a disguised ransomware attack; you are parting with money to purchase the full version of the product.
6. A Remote Access Trojan (RAT) sends passwords to the hacker who then uses them to access your computer system.
7. A zero‐day virus can only be detected by using baselines. Day zero is when it is launched and it might take the vendor a few days to find a solution.
8. A logic bomb is a virus that is triggered by an event such as time.
9. Spyware is a stealth attack that secretly tracks your internet usage and habits.
10. Adware uses pop ups as its attack vector.
11. A watering hole attack infects a well‐known trusted website.
12. A phishing attack is launched against a manager using email.
13. A spear phishing attack is launched against managers using email. In the exam, ensure you look to see whether it is singular or plural.
14. Employing a third party to incinerate your paper waste prevents dumpster diving.
15. Obtaining an email from the CEO or HR demanding you complete an attached form is a social engineering authority attack.
16. Social engineering consensus is where you want to be accepted as part of a team, so you do what the team does.
17. This is whaling where the CEO clicks on a link.
18. Cross-Site Scripting uses HTML tags and/or JavaScript.
19. An intrusive scan is used during a penetration test and can cause considerable damage to your system.
20. A wireless disassociation attack keeps disconnecting you from your wireless access point.
21. Taking control and sending messages or texts is called Bluejacking; you are basically hijacking the phone.
22. Stealing contacts from a Bluetooth phone is called bluesnarfing.
23. A man‐in‐the‐middle attack is an interception attack where the data is replayed immediately.
24. A replay attack is an interception attack where the data is replayed at a later date.
25. A virus could use port 1900 and a worm could use port 5000.
26. This is a vishing attack where my financial details are obtained via a telephone.
27. This is social engineering tailgating as you have let someone in who has not produced any credentials.
28. This is a social engineering impersonation attack as they pretend to be from your company.
29. This is a botnet carrying out a Distributed Denial of Service (DDoS) attack.
30. This is where someone stands behind you in the ATM queue with a camera videoing your transaction; this is a more modern version of a shoulder surfing attack.
31. Inserting too much data into a data field is a buffer overflow attack.
32. A SQL injection attack uses the phrase 1 = 1. The best form of mitigation is to use stored procedures where the SQL commands are embedded into a script. You would then run the script name. Input validation is another form of mitigation where you control the input.
33. The only way to prevent a DDoS attack is to use a firewall to prevent the attack from reaching the website. You may use a Web Application Firewall or a stateful firewall if your web server is located inside your DMZ. A load balancer cannot deal with DDoS.
34. This is an evil twin where the attacker's WAP looks like the legitimate WAP by using a similar SSID.
35. You can use 802.1x on a managed switch where the legitimate devices use a certificate. This way the 802.1x can validate the device that it lets connect to the switch and rogue devices will be rejected.
36. Jamming is a wireless interference attack.
37. In the CompTIA Security+ exam, if you reinstall an operating system but the virus keeps returning, this is known as a rootkit virus.
38. A computer system that uses NTLM authentication is vulnerable to the pass the hash attack. This can be prevented by using Kerberos authentication or disabling NTLM.
39. A script kiddie is someone who will purchase a program to launch his attack from. A good place to purchase dangerous tools would be the unregulated dark web.
40. A hacktivist is a politically motivated attacker.
41. The most difficult threat actor to detect is the insider threat, sometimes called a malicious insider. He is already inside your network legitimately and therefore is more difficult to track.
42. A competitor is a threat actor who will steal your trade secrets to beat you to market.
43. Pivoting is a technique where you will gain access to a network via a vulnerable low‐level host then launch an attack against a more critical computer system such as a SQL database server.
44. A gray box penetration tester knows something about your company network, no matter how trivial it seems.
45. Fuzzing is a technique where random information is submitted to an application to see what information is output. A white box tester does this to see whether any vulnerabilities need to be addressed before putting the application into production.
46. A black box penetration tester is given no information at all. He would try and use a vulnerability scanner to see whether your computer systems have any vulnerabilities that he could exploit. First of all he looks at initial exploitation.
47. Penetration testing is aggressive and penetrates deep into your network and could cause severe damage, whereas a vulnerability scan is passive and identifies missing patches.
48. You would place an end of life HVAC controller into a VLAN to mitigate the risk of attack.
49. The Chief Security Information Officer (CISO) should write that errors on the customer side should be short and very vague but on the internal side should be long and as detailed as possible to help the support team to diagnose the problem.
50. A monitoring system that does not detect any attacks is known as a false negative.
51. Resource exhaustion is where the CPU usage is running at 100%. You would mitigate this by purchasing a faster processor, installing another processor, or moving some of the load to another server.
52. A smurf attack is an amplification attack launching directed IP broadcasts to the border router. This is a massive amount of ping packets that are seen to be coming from the victim, and this results in the victim getting four times the replies. You can prevent this by disabling IP broadcasts on the border router.
53. A pharming attack redirects you from going to a legitimate website and sends you to a fraudulent website.
54. DNSSEC encrypts the DNS traffic to prevent DNS poisoning attacks. It produces RRSIG records.
55. Session hijacking is an attack where the attacker steals cookies from your computer system.
56. If you type your URL incorrectly, you could be redirected to a fraudulent website; this is known as typo‐squatting.
57. Rainbow tables are pre-computed lists of passwords and their corresponding hash values. Rainbow tables are used for collision attacks against passwords stored as hash values.
58. A dictionary attack uses only proper words that you would expect in a dictionary. Any passwords that have random characters or passwords that are misspelled prevent a dictionary attack.
59. A brute force attack is a password attack that uses every available combination of letters and characters...

Table of contents

Citation styles for CompTIA Security+ Practice Tests SY0-501

APA 6 Citation

Neil, I. (2020). CompTIA Security+ Practice Tests SY0-501 (1st ed.). Packt Publishing. Retrieved from https://www.perlego.com/book/1343372/comptia-security-practice-tests-sy0501-practice-tests-in-4-different-formats-and-6-cheat-sheets-to-help-you-pass-the-comptia-security-exam-pdf (Original work published 2020)

Chicago Citation

Neil, Ian. (2020) 2020. CompTIA Security+ Practice Tests SY0-501. 1st ed. Packt Publishing. https://www.perlego.com/book/1343372/comptia-security-practice-tests-sy0501-practice-tests-in-4-different-formats-and-6-cheat-sheets-to-help-you-pass-the-comptia-security-exam-pdf.

Harvard Citation

Neil, I. (2020) CompTIA Security+ Practice Tests SY0-501. 1st edn. Packt Publishing. Available at: https://www.perlego.com/book/1343372/comptia-security-practice-tests-sy0501-practice-tests-in-4-different-formats-and-6-cheat-sheets-to-help-you-pass-the-comptia-security-exam-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Neil, Ian. CompTIA Security+ Practice Tests SY0-501. 1st ed. Packt Publishing, 2020. Web. 14 Oct. 2022.