Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July CompTIA Official New Released SY0-501
100% Free Download! 100% Pass Guaranteed!
CompTIA Security Certification Exam
Question No: 1
Which of the following cryptographic attacks would salting of passwords render ineffective?
-
Dictionary
-
Rainbow tables
-
Birthday
-
none of the above
Answer: C
Question No: 2
Which of the following network vulnerability scan indicators BEST validates a successful, active scan?
-
The scan job is scheduled to run during off-peak hours.
-
The scan output lists SQL injection attack vectors.
-
The scan data identifies the use of privileged-user credentials
-
The scan results identify the hostname and IP address
Answer: B
Question No: 3
Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Winch of the following should be used to sign the users’ certificates?
-
CA
-
CRL
-
CSR
-
none of the above
Answer: C
Question No: 4
Which of the following threat actors is MOST likely to steal a company’s proprietary information to gain a market edge and reduce time to market?
-
Competitor
-
Hacktivist
-
Insider
-
Organized crime
Answer: C
Question No: 5
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
-
DES
-
AES
-
MD5
-
WEP
Answer: D
Question No: 6
In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?
-
Elasticity
-
Scalability
-
High availability
-
Redundancy
Answer: C
Question No: 7
Which of the following types of cloud Infrastructures would allow several organizations with similar structures and interests to realize shared storage and resources?
-
Private
-
Hybrid
-
Public
-
Community
Answer: A
Question No: 8
A systems administrator is reviewing the following information from a compromised server:
Given the above information, which of the following processes was MOST likely exploited via a remote buffer overflow attack?
-
Apache
-
LSASS
-
MySQL
-
TFTP
Answer: C
Question No: 9
A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?
-
Obtain a list of passwords used by the employee.
-
Generate a report on outstanding projects the employee handled
-
Have the employee surrender company identification.
-
Have the employee sign an NDA before departing
Answer: A
Question No: 10
A company hires a consulting firm to crawl its Active Directory network with a non-domain account looking for unpatched systems. Actively taking control of systems is out of scope, as is the creation of new administrator accounts. For which of the following is the company hiring the consulting firm?
-
Vulnerability scanning
-
Penetration testing
-
Application fuzzing
-
User permission
Answer: A
100% Dumps4cert Free Download!
–Download Free Demo:SY0-501 Demo PDF
100% Dumps4cert Pass Guaranteed!
–SY0-501 Dumps
Dumps4cert | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |