[Free] 2019(Oct) EnsurePass CompTIA SY0-501 Dumps with VCE and PDF 21-30

Get Full Version of the Exam
http://www.EnsurePass.com/SY0-501.html

Question No.21

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?

  1. DMZ

  2. NAT

  3. VPN

  4. PAT

Correct Answer: C

Question No.22

Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:

image

Slow performance

image

image

Word documents, PDFs, and images no longer opening A pop-up

Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?

  1. Spyware

  2. Crypto-malware

  3. Rootkit

  4. Backdoor

Correct Answer: D

Question No.23

An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt. Which of the following terms BEST describes the actor in this situation?

  1. Script kiddie

  2. Hacktivist

  3. Cryptologist

  4. Security auditor

Correct Answer: A

Question No.24

A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords. The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? (Select two.)

  1. The portal will function as a service provider and request an authentication assertion.

  2. The portal will function as an identity provider and issue an authentication assertion.

  3. The portal will request an authentication ticket from each network that is transitively trusted.

  4. The back-end networks will function as an identity provider and issue an authentication assertion.

  5. The back-end networks will request authentication tickets from the portal, which will act as the third-party service provider authentication store.

  6. The back-end networks will verify the assertion token issued by the portal functioning as the identity provider.

Correct Answer: AB

Question No.25

A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?

  1. Deterrent

  2. Preventive

  3. Detective

  4. Compensating

Correct Answer: A

Question No.26

HOTSPOT

Select the appropriate attack from each drop down list to label the corresponding illustrated attack.

Instructions:

Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit.

image

Correct Answer:

image

Question No.27

Which of the following security controls does an iris scanner provide?

  1. Logical

  2. Administrative

  3. Corrective

  4. Physical

  5. Detective

  6. Deterrent

Correct Answer: D

Question No.28

A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?

A. WPS B. 802.1x

  1. WPA2-PSK

  2. TKIP

Correct Answer: A

Question No.29

A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company#39;s email filter, website filter, or antivirus. Which of the following describes what occurred?

  1. The user#39;s account was over-privileged.

  2. Improper error handling triggered a false negative in all three controls.

  3. The email originated from a private email server with no malware protection.

  4. The virus was a zero-day attack.

Correct Answer: D

Question No.30

Which of the following would a security specialist be able to determine upon examination of a server#39;s certificate?

  1. CA public key

  2. Server private key

  3. CSR

  4. OID

Correct Answer: D

Get Full Version of the Exam
SY0-501 Dumps
SY0-501 VCE and PDF

Tagged , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *