What does the acronym SYO-501 stand for?
CompTIA Security+ SY0-501
True or False: The SYO-501 exam focuses solely on technical skills.
False
Which of the following is a key objective of the SYO-501 exam? (A) Risk management (B) Web development (C) Database design
A) Risk management
Fill in the blank: The __________ model is commonly used to understand the layers of security in a network.
CIA
What is the primary purpose of a firewall?
To control incoming and outgoing network traffic based on predetermined security rules.
True or False: Social engineering attacks rely on exploiting human psychology.
True
Which of the following is NOT a type of malware? (A) Virus (B) Worm (C) Firewall
C) Firewall
What does the term ‘phishing’ refer to?
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Multiple choice: What is the purpose of encryption? (A) To speed up data processing (B) To protect data confidentiality (C) To improve data access speed
B) To protect data confidentiality
What is an Intrusion Detection System (IDS)?
A device or software application that monitors network or system activities for malicious activities or policy violations.
True or False: A VPN provides a secure connection over the internet.
True
Fill in the blank: __________ is the process of verifying the identity of a user or device.
Authentication
Which security principle involves the least amount of privilege necessary for users? (A) Least Privilege (B) Maximum Privilege (C) Total Control
A) Least Privilege
What does the term ‘DDoS’ stand for?
Distributed Denial of Service
Multiple choice: Which of the following is a common type of authentication? (A) Password (B) IP address (C) MAC address
A) Password
What is the main goal of penetration testing?
To identify vulnerabilities in a system before they can be exploited by attackers.
True or False: Two-factor authentication adds an extra layer of security beyond just a password.
True
Fill in the blank: __________ is the act of taking unauthorized control of a computer system.
Hacking
Which of the following is a risk associated with cloud computing? (A) Increased accessibility (B) Data breaches (C) Cost savings
B) Data breaches
What does ‘patch management’ involve?
The process of managing updates for software applications and technologies.
Multiple choice: Which of the following is a type of physical security control? (A) Firewalls (B) Security cameras (C) Antivirus software
B) Security cameras
True or False: A security policy outlines the rules and procedures for maintaining security within an organization.
True
What is the primary function of an antivirus program?
To detect and remove malicious software from computers and networks.
Fill in the blank: __________ refers to the practice of monitoring and analyzing network traffic for suspicious activity.
Network security monitoring