BraindumpsIT http://www.braindumpsit.com BraindumpsIT - IT Certification Company provides Braindumps pdf!
Exam : SY0-501 Title : CompTIA Security+ Certification Exam Vendor : CompTIA Version : DEMO Get Latest & Valid SY0-501 Exam's Question and Answers 1 from Braindumpsit.com. 1
NO.1 A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees? A. 802.1x B. TKIP C. WPA2-PSK D. WPS NO.2 Ann, a college professor, was recently reprimanded for posting disparaging remarks re-grading her coworkers on a web site. Ann stated that she was not aware that the public was able to view her remakes. Which of the following security-related trainings could have made Ann aware of the repercussions of her actions? A. Data Labeling and disposal B. Role-based training C. Use of P2P networking D. Use of social networking NO.3 When designing a web based client server application with single application server and database cluster backend, input validation should be performed: A. Using HTTPS B. On the application server C. Using database stored procedures D. On the client NO.4 Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth? A. Bluesnarfing B. Bluejacking C. Rogue tethering D. War chalking Explanation Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vcard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol. NO.5 A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation? Get Latest & Valid SY0-501 Exam's Question and Answers 2 from Braindumpsit.com. 2
A. SNMP data leaving the printer will not be properly encrypted. B. Attackers can use the PCL protocol to bypass the firewall of client computers. C. An attacker can easily inject malicious code into the printer firmware. D. An MITM attack can reveal sensitive information. E. An attacker can access and change the printer configuration. NO.6 Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user's certificates? A. CA B. CRL C. CSR D. RA NO.7 A member of a digital forensics team, Joe arrives at a crime scene and is preparing to collect system data. Before powering the system off, Joe knows that he must collect the most volatile date first. Which of the following is the correct order in which Joe should collect the data? A. RAM, CPU cache. Remote logging data, paging/swap files B. CPU cache, paging/swap files, RAM, remote logging data C. Paging/swap files, CPU cache, RAM, remote logging data D. CPU cache, RAM, paging/swap files, remote logging data NO.8 The firewall administrator is adding a new certificate for the company's remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected. Which of the following is required to complete the certificate chain? A. Intermediate authority B. Recovery agent C. Certificate revocation list D. Root of trust NO.9 A security analyst receives an alert from a WAF with the following payload: var data= "<test test test>" ++ <../../../../../../etc/passwd>" Which of the following types of attacks is this? A. Buffer overflow B. SQL injection C. JavaScript data insertion Get Latest & Valid SY0-501 Exam's Question and Answers 3 from Braindumpsit.com. 3
D. Cross-site request forgery E. Firewall evasion scipt Answer: C NO.10 A security administrator wishes to implement a secure a method of file transfer when communicating with outside organizations. Which of the following protocols would BEST facilitate secure file transfers? (Select TWO) A. FTPS B. SCP C. SNMP D. TFTP E. FTP F. SMTP,B NO.11 A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net). Which of the following rules is preventing the CSO from accessing the site? Blocked sites: *.nonews.com, *.rumorhasit.net, *.mars? A. Rule 4: deny from any to any source any destination any service any B. Rule 3: deny from inside to outside source any destination {blocked sites} service http-https C. Rule 2: deny from inside to outside source any destination any service ping D. Rule 1: deny from inside to outside source any destination any service smtp NO.12 A security administrator receives an alert from a third-party vendor that indicates a certificate that was installed in the browser has been hijacked at the root of a small public CA. The security administrator knows there are at least four different browsers in use on more than a thousand computers in the domain worldwide. Which of the following solution would be BEST for the security administrator to implement to most efficiently assist with this issue? A. CRL B. SSL C. ACL D. PKI NO.13 Which of the following cryptographic attacks would salting of passwords render ineffective? A. Birthday B. Rainbow tables C. Brute force D. Dictionary Get Latest & Valid SY0-501 Exam's Question and Answers 4 from Braindumpsit.com. 4
NO.14 An employee receives an email, which appears to be from the Chief Executive Officer (CEO), asking for a report of security credentials for all users. Which of the following types of attack is MOST likely occurring? A. Spear phishing B. Policy violation C. Whaling D. Social engineering NO.15 When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK? A. MD5 B. AES C. WEP D. DES Explanation AES is the encryption algorithm used in WPA2 and uses a particular process, ormode, within WPA2 to encrypt traffic. This mode is called the Counter-mode (CTR)Cipher Block Chaining Message Authentication Code Protocol (CMC-MAC) or, adding itall together, CCMP. CCMP uses a 128-bit key and 128-bit block size (since it is a blocksymmetric cipher, as opposed to the streaming RC4 symmetric cipher used in WEP andwpa), as well as 48-bit initialization vectors (IVs). The larger IV sizes help prevent replayattacks from being conducted against WPA2 NO.16 Which of the following encryption methods does PKI typically use to securely project keys? A. Elliptic curve B. Asymmetric C. Obfuscation D. Digital signatures Get Latest & Valid SY0-501 Exam's Question and Answers 5 from Braindumpsit.com. 5