[23 Feb 2018] New SY0-501 Dumps With Online Exam Engine and PDF from Test4practice (Updated Questions 01-10)

[23 Feb 2018 Updated] Test4practice Premium 91questions SY0-501 Exam Questions For Free Download

Be CompTIA certified and prove your skills!!! Test4practice is the most useful resource to become successful in your CompTIA-Security+ SY0-501 exam. Amongst several exam dumps providers, Test4practice is the foremost and valid exam dumps provider. We deliver outstanding SY0-501 exam questions to SY0-501 exam contenders. Pass your SY0-501 exam by preparing our valid SY0-501 exam dumps at first trial!!

SY0-501 Online Exam Engine Demo : http://selfexamtraining.com/demo.php?demo=Sy0-501comptia security+ sy0-501 pdf

Question # 1:
An organization finds that most help desk calls are regarding account lockout due to a
variety of applications running on different systems. Management is looking for a solution to
reduce the number of account lockouts while improving security. Which of the following is
the BEST solution for this organization?
A. Create multiple application accounts for each user.
B. Provide secure tokens.
C. Implement SSO.
D. Utilize role-based access control.
Answer: C
Question # 2:
Malicious traffic from an internal network has been detected on an unauthorized port on an
application server.
Which of the following network-based security controls should the engineer consider
D. MAC filtering
Answer: A
Question #3 :
A systems administrator is attempting to recover from a catastrophic failure in the
datacenter. To recover the domain controller, the systems administrator needs to provide
the domain administrator credentials. Which of the following account types is the systems
administrator using?
A. Shared account
B. Guest account
C. Service account
D. User account
Answer: C
Question # 4:
Which of the following attack types BEST describes a client-side attack that is used to
manipulate an HTML iframe with JavaScript code via a web browser?
A. Buffer overflow
Answer: C
Question # 5:
A security analyst is hardening a server with the directory services role installed. The
analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains
compatibility with LDAP clients. Which of the following should the analyst implement to
meet these requirements? (Select two.)
A. Generate an X.509-compliant certificate that is signed by a trusted CA.
B. Install and configure an SSH tunnel on the LDAP server.
C. Ensure port 389 is open between the clients and the servers using the communication.
D. Ensure port 636 is open between the clients and the servers using the communication.
E. Remote the LDAP directory service role from the server.
Answer: B,D
Question #6 :
Drag the items on the left to show the different types of security for the shown devices. Not
all fields need to be filled. Not all items need to be used.

sy0-501 PDf, sy0-501 PDf questions


sy0-501 PDF Dumps

Mobile Device Security
GPS tracking
Remote wipe
Device Encryption
Strong password
Server in Data Center Security
Proximity Badges
For mobile devices, at bare minimum you should have the following security measures in
place: Screen lock, Strong password, Device encryption, Remote wipe/Sanitation, voice
encryption, GPS tracking, Application control, Storage segmentation, Asset tracking as well
as Device Access control.
For servers in a data center your security should include: Fire extinguishers such as FM200
as part of fire suppression; Biometric, proximity badges, mantraps, HVAC, cable locks;
these can all be physical security measures to control access to the server.
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex,
Indianapolis, 2014, p. 418
Question # 7:
A department head at a university resigned on the first day of the spring semester. It was
subsequently determined that the department head deleted numerous files and directories
from the server-based home directory while the campus was closed. Which of the following
policies or procedures could have prevented this from occurring?
A. Time-of-day restrictions
B. Permission auditing and review
C. Offboarding
D. Account expiration
Answer: D
Question # 8:
Which of the following cryptographic attacks would salting of passwords render ineffective?
A. Brute force
B. Dictionary
C. Rainbow tables
D. Birthday
Answer: B
Question # 9:
Which of the following BEST describes an important security advantage yielded by
implementing vendor diversity?
A. Sustainability
B. Homogeneity
C. Resiliency
D. Configurability
Answer: C
Question # 10:
Users report the following message appears when browsing to the company’s secure site:
This website cannot be trusted. Which of the following actions should a security analyst
take to resolve these messages? (Select two.)
A. Verify the certificate has not expired on the server.
B. Ensure the certificate has a .pfx extension on the server.
C. Update the root certificate into the client computer certificate store.
D. Install the updated private key on the web server.
E. Have users clear their browsing history and relaunch the session.
Answer: A,C



Leave a Reply

Your email address will not be published. Required fields are marked *