A high-security defense installation recently began utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
A. Preventive
B. Detective
C. Compensating
Answer: A
Multiple organizations operating in the same vertical want to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?
A. Shibboleth
B. RADIUS federation
C. SAML
D. OAuth
E. OpenlD connect
Answer: D
Download CompTIA SY0-501 Exam Latest Question Answers - Updated Sy0-501 Braindumps
Question No : 3
An analyst wants to implement a more secure wifeless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?
A. PEAP
B. EAP
C. WPA2
D. RADIUS
Answer: C
Question No : 4
An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment DNSSEC at the organization?
A. TPM
B. TLS
C. SSL
D. PW
Answer: C
Prepare
CompTIA Sy0-501 Final Exam With Realexamdumps.com Student Success Tips
Question No : 5
A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures co have prevented this from occurring?
A. Time-of-day restrictions
B. Permission auditing and review
C. Offboarding
D. Account expiration
Answer: C
Question No : 6
A company is using a mobile device deployment model in which employees use their personal devices for work at their own discretion. Some of the problems the company is encountering include the following:
* There is no standardization.
* Employees ask for reimbursement for their devices.
* Employees do not replace their devices often enough to keep them running efficiently.
* The company does not have enough control over the devices.
Which of the following is a deployment model that would help the company overcome these problems?
A. BYOD
B. VDI
C. COPE
D. CYOD
Answer: C
Download
CompTIA Sy0-501 Exam Questions - Free 3 Months Updates - Realexamdumps.com
Question No : 7
Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
- Slow performance
- Word documents, PDFs, and images no longer opening
- A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?
A. Crypto-malware
B. Rootkit
C. Backdoor
Answer: C
Question No : 8
Refer to the following code:
Which of the following vulnerabilities would occur if this is executed?
A. Page exception
B. Pointer dereference
C. NullPointerException
D. Missing null check
Answer: D
Question No : 9
A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system While attempting to determine if an unauthorized user is togged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network.
Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?
A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are togged onto the network.
C. Deny the "unknown" host because the hostname is not known and MAC filtering is not applied to this host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.
Answer: C
A. Apply MAC filtering and see if the router drops any of the systems.
B. Physically check each of the authorized systems to determine if they are togged onto the network.
C. Deny the "unknown" host because the hostname is not known and MAC filtering is not applied to this host.
D. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.
Answer: C









No comments:
Post a Comment