[Free] 2018(July) Dumps4cert CompTIA SY0-501 Dumps with VCE and PDF Download 21-30

By | July 18, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 July CompTIA Official New Released SY0-501
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification Exam

Question No: 21

Which of the following specifically describes the exploitation of an interactive process to access otherwise restricted areas of the OS?

  1. Pivoting

  2. Process affinity

  3. Buffer overflow

  4. none of the above

Answer: A

Question No: 22

A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select TWO).

  1. Generate an X 509-complaint certificate that is signed by a trusted CA.

  2. Install and configure an SSH tunnel on the LDAP server.

  3. Ensure port 389 is open between the clients and the servers using the communication.

  4. Ensure port 636 is open between the clients and the servers using the communication.

  5. Remove the LDAP directory service role from the server.

Answer: AB

Question No: 23

As part of a new industry regulation, companies are required to utilize secure, standardized OS settings. A technician must ensure the OS settings are hardened. Which of the following is the BEST way to do this?

  1. Use a vulnerability scanner.

  2. Use a configuration compliance scanner.

  3. Use a passive, in-line scanner.

  4. Use a protocol analyzer.

Answer: A

Question No: 24

Which of the following implements two-factor authentication?

  1. A phone system requiring a PIN to make a call

  2. An ATM requiring a credit card and PIN

  3. A computer requiring username and password

  4. A datacenter mantrap requiring fingerprint and iris scan

Answer: D

Question No: 25

A company’s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access. Which of the following types of attacks are MOST likely occurring? (Select TWO)

  1. Replay

  2. Rainbow tables

  3. Brute force

  4. Pass the hash

  5. Dictionary

Answer: DE

Question No: 26

Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?

  1. Shibboleth

  2. RADIUS federation

  3. SAML

  4. OAuth

  5. OpenlD connect

Answer: D

Question No: 27

Which of the following BEST describes a routine in which semicolons, dashes, quotes, and commas are removed from a string?

  1. Error handling to protect against program exploitation

  2. Exception handling to protect against XSRF attacks

  3. Input validation to protect against SQL injection

  4. Padding to protect against string buffer overflows

Answer: C

Question No: 28


Select the appropriate attack from each drop down list to label the corresponding illustrated attack.


Attacks may only be used once, and will disappear from drop down list if selected.

When you have completed the simulation, please select the Done button to submit.

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

Question No: 29

After a user reports stow computer performance, a systems administrator detects a suspicious file, which was installed as part of a freeware software package. The systems administrator reviews the output below:

Dumps4Cert 2018 PDF and VCE

Based on the above information, which of the following types of malware was installed on the user’s computer?

  1. Keylogger

  2. Spyware

  3. Worm

  4. Bot

Answer: B

Question No: 30

A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?

  1. Botnet

  2. Ransomware

  3. Polymorphic malware

  4. Armored virus

Answer: A

100% Dumps4cert Free Download!
Download Free Demo:SY0-501 Demo PDF
100% Dumps4cert Pass Guaranteed!
SY0-501 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.