[Free] 2018(Aug) Dumps4cert CompTIA SY0-501 Dumps with VCE and PDF Download 1-10

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released SY0-501
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification Exam

Question No: 1

Which of the following cryptographic attacks would salting of passwords render ineffective?

  1. Dictionary

  2. Rainbow tables

  3. Birthday

  4. none of the above

Answer: C

Question No: 2

Which of the following network vulnerability scan indicators BEST validates a successful, active scan?

  1. The scan job is scheduled to run during off-peak hours.

  2. The scan output lists SQL injection attack vectors.

  3. The scan data identifies the use of privileged-user credentials

  4. The scan results identify the hostname and IP address

Answer: B

Question No: 3

Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Winch of the following should be used to sign the users’ certificates?

  1. CA

  2. CRL

  3. CSR

  4. none of the above

Answer: C

Question No: 4

Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?

  1. Competitor

  2. Hacktivist

  3. Insider

  4. Organized crime

Answer: C

Question No: 5

When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?

  1. DES

  2. AES

  3. MD5

  4. WEP

Answer: D

Question No: 6

In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?

  1. Elasticity

  2. Scalability

  3. High availability

  4. Redundancy

Answer: C

Question No: 7

Which of the following types of cloud Infrastructures would allow several organizations with similar structures and interests to realize shared storage and resources?

  1. Private

  2. Hybrid

  3. Public

  4. Community

Answer: A

Question No: 8

A systems administrator is reviewing the following information from a compromised server:

Dumps4Cert 2018 PDF and VCE

Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?

  1. Apache

  2. LSASS

  3. MySQL

  4. TFTP

Answer: C

Question No: 9

A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?

  1. Obtain a list of passwords used by the employee.

  2. Generate a report on outstanding projects the employee handled

  3. Have the employee surrender company identification.

  4. Have the employee sign an NDA before departing

Answer: A

Question No: 10

A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?

  1. Vulnerability scanning

  2. Penetration testing

  3. Application fuzzing

  4. User permission

Answer: A

100% Dumps4cert Free Download!
SY0-501 PDF
100% Dumps4cert Pass Guaranteed!
SY0-501 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com