[Free] 2019(Oct) EnsurePass CompTIA SY0-501 Dumps with VCE and PDF 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/SY0-501.html

Question No.41

A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack. News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong?

  1. SoC

  2. ICS

  3. IoT

  4. MFD

Correct Answer: C

Question No.42

DRAG DROP

A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.

image

Correct Answer:

image

Question No.43

Which of the following encryption methods does PKI typically use to securely project keys?

  1. Elliptic curve

  2. Digital signatures

  3. Asymmetric

  4. Obfuscation

Correct Answer: C

Question No.44

An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?

  1. PEAP

  2. EAP

  3. WPA2

  4. RADIUS

Correct Answer: A

Question No.45

When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:

  1. system sprawl

  2. end-of-life systems

  3. resource exhaustion

  4. a default configuration

Correct Answer: B

Question No.46

When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?

  1. DES

  2. AES

  3. MD5

  4. WEP

Correct Answer: B

Question No.47

DRAG DROP

Determine the types of Attacks from right to specific action.

image

Correct Answer:

image

Question No.48

Refer to the following code:

image

Which of the following vulnerabilities would occur if this is executed?

  1. Page exception

  2. Pointer deference

  3. NullPointerException

  4. Missing null check

Correct Answer: D

Question No.49

When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?

  1. Owner

  2. System

  3. Administrator

  4. User

Correct Answer: C

Question No.50

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?

  1. The recipient can verify integrity of the software patch.

  2. The recipient can verify the authenticity of the site used to download the patch.

  3. The recipient can request future updates to the software using the published MD5 value.

  4. The recipient can successfully activate the new software patch.

Correct Answer: A

Get Full Version of the Exam
SY0-501 Dumps
SY0-501 VCE and PDF

Tagged , , , , , ,

Leave a Reply

Your email address will not be published. Required fields are marked *