1 / 8

SY0-501 Exam Practice Study Guides 2020

Get high achievement rate in SY0-501 Certification Exam with our exam PDF questions answers engineered by the supported people of Information Technology industry. For more data please visit here: https://www.certswarrior.com/exam/SY0-501/

michalhen
Télécharger la présentation

SY0-501 Exam Practice Study Guides 2020

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Comptia SY0-501 CompTIA Security+ Certification Exam Questions & Answers PDF For More Information: https://www.certswarrior.com/ Features: 90 Days Free Updates 30 Days Money Back Guarantee Instant Download Once Purchased 24/7 Online Chat Support Its Latest Version Visit us at

  2. Latest Version: 62.0 Question: 1 A security engineer deploys a certificate from a commercial CA to the RADIUS server for use with the EAP-TLS wireless network. Authentication is failing, so the engineer examines the certificate's properties: Which of the following is the MOST likely cause of the failure? A. The certificate is missing the proper OID. B. The certificate is missing wire-less authentication in key usage. C. The certificate is self-signed. D. The certificate has expired. Answer: A Question: 2 An organization has the following password policies: • Passwords must be at least 16 characters long. • Three tailed login attempts will lock the account (or live minutes. • Passwords must have one uppercase letter, one lowercase letter, and one non-alphanumeric symbol. A database server was recently breached, and the incident response team suspects the passwords were compromised. Users with permission on that database server were forced to change their passwords for that server. Unauthorized and suspicious logins are now being detected on the same server. Which of the following is MOST likely the issue, and what should be done? A. Some users have reset their account to a previously used password; implement a password history policy. B. Service accounts are being used to log onto the server; restrict service account permissions to read/ write. C. Single sign-on is allowing remote logins to the database server; disable single sign-on until it can be properly configured. Visit us at

  3. D. Users are logging in after working hours; implement a time-of-day restriction for the database servers. Answer: D Question: 3 A company recently experienced a security breach. The security start determined that the intrusion was due to an out-of-date proprietary software program running on a non-compliant server The server was imaged and copied onto a hardened VM. with the previous connections re-established. Which of the Mowing Is the NEXT step in the incident response process? A. Recovery B. Eradication C. Lessons learned D. Containment E. Identification Answer: E Question: 4 Which of the following are disadvantages of full backups? (Select THREE) A. They rely on other backups tor recovery B. They require the most storage. C. They demand the most bandwidth. D. They have the slowest recovery time E. They are impossible in virtual environments F. They require on-site storage. G. They are time-consuming to complete. Answer: BCG Question: 5 A software development company needs to augment staff by hiring consultants for a high-stakes project The project has the following requirements: • Consultants will have access to flighty confidential, proprietary data. • Consultants will not be provided with company-owned assets. • Work needs to start Immediately. • Consultants will be provided with Internal email addresses for communications. Visit us at

  4. Which of the following solutions is the BEST method lor controlling data exfiltration during this project? A. Require that all consultant activity be restricted to a secure VDI environment. B. Require the consultants to sign an agreement stating they will only use the company-provided email address for communications during the project. C. Require updated antivirus. USB blocking, and a host-based firewall on all consultant devices. D. Require the consultants to conned to the company VPN when accessing confidential resources. Answer: C Question: 6 An organization uses simulated phishing attacks on its users to better prepare them to recognize actual phishing attacks and get them accustomed to reporting the attacks to the security team. This is an example of: A. baselining B. user training C. stress testing D. continuous monitoring Answer: B Question: 7 A technician is evaluating a security appliance solution. The company needs a system that continues to pass traffic if the system crashes. Which of the following appliance feature would BEST meet the company’s needs? A. Fall closed. B. Fall Secure C. Fall Safe D. Fall open Answer: D Question: 8 A pass-the-hash attack is commonly used to: A. modify DNS records to point to a different domains. B. modify the IP address of the targeted computer. Visit us at

  5. C. execute java script to capture user credentials. D. laterally move across the network. Answer: D Question: 9 A security administrator has been conducting an account permissions review that has identified several users who belong to functional groups and groups responsible for auditing the functional groups' actions. Several recent outages have not been able to be traced to any user. Which of the following should the security administrator recommend to preserve future audit tag integrity? A. Enforcing stricter onboarding workflow policies. B. Applying least privilege to user group membership. C. Following standard naming conventions for audit group users. D. Restricting audit group membership to service accounts. Answer: B Question: 10 Which of the following BEST describes why an air gap is a useful security control? A. It physically isolates two or more networks, therefore helping prevent cross contamination or accidental data spillage. B. It requires that files be transferred via USB instead of networks that are potentially vulnerable to hacking, therefore preventing virus infections. C. It requires multiple systems administrators with different credentials, therefore providing separation of duties. D. It provides physical space between two interlocking doors, therefore providing additional control from unauthorized entry. Answer: A Question: 11 When choosing a hashing algorithm for storing passwords in a web server database, which of the following is the BEST explanation for choosing HMAC-MD5 over simple MD5? A. HMAC provides hardware acceleration thus speeding up authentication B. HMAC adds a transport layer handshake which improves authentication C. HMAC-MD5 can be decrypted taster speeding up performance Visit us at

  6. D. HMAC-M05 is more resistant to brute forcing Answer: A Question: 12 Buffer overflow can be avoided using proper. A. memory leak prevention B. memory reuse C. input validation D. implementation of ASLR Answer: C Question: 13 A company has users and porters in multiple geographic locations and the printers are locked in common areas of the offices To preserve the confidentially of PII, a security administrator needs to implement the appropriate controls Which of the following would BEST meet the confidentiality requirements of the data? A. Enforcing location-based policy restrictions B. Adding location to the standard naming convention C. implementing time-of-day restrictions based on location D. Conducting regular account maintenance at each location Answer: A Question: 14 A penetration tester was able to connect to a company's internal network and perform scans and staged attacks for the duration of the testing period without being noticed. The SIEM did not alert the security team to the presence of the penetration tester's devices on the network Which of the following would provide the security team with notification in a timely manner? A. Implement rogue system detection and sensors. B. Create a trigger on the IPS and alert the security team when unsuccessful logins occur. C. Decrease the correlation threshold for alerts on the SIEM. D. Run a credentialed vulnerability scan Visit us at

  7. Answer: A Question: 15 An organization uses an antivirus scanner from Company A on its firewall, an email system antivirus scanner from Company B. and an endpoint antivirus scanner from Company C. This is an example of: A. unified threat management. B. an OVAL system. C. vendor diversity. D. alternate processing sites. Answer: C Visit us at

  8. http://www.certswarrior.com/ Questions and Answers (PDF) For More Information – Visit link below: http://www.certswarrior.com Disc ount Coupon Code: CERT SWARRIOR10 Page | 1 http://www.certswarrior.com/exam/M2180-651/ Visit us at Powered by TCPDF (www.tcpdf.org)

More Related