BraindumpsVCE http://www.braindumpsvce.com Best vce braindumps-exam vce pdf free download
Exam : SY0-501 Title : CompTIA Security+ Certification Exam Vendor : CompTIA Version : DEMO Get Latest & Valid SYO-501 Exam's Question and Answers 1 from Braindumpsvce.com. 1
NO.1 An attacker compromises a public CA and issues unauthorized X.509 certificates for Company.com. In the future, Company.com wants to mitigate the impact of similar incidents. Which of the following would assist Company.com with its goal? A. Certificate pinning B. Certificate chaining C. Certificate stapling D. Certificate with extended validation NO.2 A manager wants to distribute a report to several other managers within the company. Some of them reside in remote locations that are not connected to the domain but have a local server. Because there is sensitive data within the report and the size of the report is beyond the limit of the email attachment size, emailing the report is not an option. Which of the following protocols should be implemented to distribute the report securely? (Select three.) A. FTPS B. HTTPS C. SNMPv3 D. SSH E. LDAPS F. S/MIME G. SRTP,B,D NO.3 A company is developing a new system that will unlock a computer automatically when an authorized user sits in front of it, and then lock the computer when the user leaves. The user does not have to perform any action for this process to occur. Which of the following technologies provides this capability? A. Fingerprint scanner B. Facial recognition C. Smart cards D. Motion detector NO.4 A network technician is trying to determine the source of an ongoing network based attack. Which of the following should the technician use to view IPv4 packet data on a particular internal network segment? A. Protocol analyzer B. Firewall C. Switch D. Proxy Get Latest & Valid SYO-501 Exam's Question and Answers 2 from Braindumpsvce.com. 2
NO.5 A security administrator returning from a short vacation receives an account lock-out message when attempting to log into the computer. After getting the account unlocked the security administrator immediately notices a large amount of emails alerts pertaining to several different user accounts being locked out during the past three days. The security administrator uses system logs to determine that the lock-outs were due to a brute force attack on all accounts that has been previously logged into that machine. Which of the following can be implemented to reduce the likelihood of this attack going undetected? A. Password complexity rules B. Continuous monitoring C. User access reviews D. Account lockout policies NO.6 A company has a data system with definitions for "Private" and "Public". The company's security policy outlines how data should be protected based on type. The company recently added the data type "Proprietary". Which of the following is the MOST likely reason the company added this data type? A. Better data classification B. Reduced cost C. Expanded authority of the privacy officer D. More searchable data NO.7 Which of the following would a security specialist be able to determine upon examination of a server's certificate? A. CSR B. Server private key C. OID D. CA public key NO.8 A system administrator wants to provide balance between the security of a wireless network and usability. The administrator is concerned with wireless encryption compatibility of older devices used by some employees. Which of the following would provide strong security and backward compatibility when accessing the wireless network? A. WPA using a preshared key B. WPA2 using a RADIUS back-end for 802.1x authentication C. WEP with a 40-bit key D. Open wireless network and SSL VPN NO.9 Joe a computer forensic technician responds to an active compromise of a database server. Joe first collects information in memory, then collects network traffic and finally conducts an image of Get Latest & Valid SYO-501 Exam's Question and Answers 3 from Braindumpsvce.com. 3
the hard drive. Which of the following procedures did Joe follow? A. Chain of custody B. Recovery procedure C. Order of volatility D. Incident isolation NO.10 A network technician is setting up a segmented network that will utilize a separate ISP to provide wireless access to the public area for a company. Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network? A. Wi-Fi Protected setup B. Pre-shared key C. Enterprise D. Captive portal Answer: D NO.11 A company exchanges information with a business partner. An annual audit of the business partner is conducted against the SLA in order to verify: A. Performance and service delivery metrics B. Data ownership is being maintained and audited C. Risk awareness is being adhered to and enforced D. Backups are being performed and tested NO.12 A company would like to prevent the use of a known set of applications from being used on company computers. Which of the following should the security administrator implement? A. Application hardening B. Blacklisting C. Whitelisting D. Anti-malware E. Disable removable media NO.13 An administrator discovers the following log entry on a server: Nov 12 2013 00:23:45 httpd[2342]: GET /app2/prod/proc/process.php?input=change;cd%20../../../etc;cat%20shadow Which of the following attacks is being attempted? A. Password attack B. Buffer overflow C. Cross-site scripting Get Latest & Valid SYO-501 Exam's Question and Answers 4 from Braindumpsvce.com. 4
D. Command injection NO.14 A development team has adopted a new approach to projects in which feedback is iterative and multiple iterations of deployments are provided within an application's full life cycle. Which of the following software development methodologies is the development team using? A. Rapid B. Waterfall C. Extreme D. Agile Answer: D NO.15 A user has attempted to access data at a higher classification level than the user's account is currently authorized to access. Which of the following access control models has been applied to this user's account? A. ABAC B. DAC C. MAC D. RBAC NO.16 A security analyst is working on a project that requires the implementation of a stream cipher. Which of the following should the analyst use? A. Hash function B. Public key cryptography C. Symmetric algorithm D. Elliptic curve Get Latest & Valid SYO-501 Exam's Question and Answers 5 from Braindumpsvce.com. 5