2018 June Latest CompTIA SY0-501 Exam Dumps with PDF and VCE Just Updated Today! Following are some new SY0-501 Real Exam Questions:
1.|2018 Latest SY0-501 Exam Dumps (PDF & VCE) 563Q Download:
https://www.braindump2go.com/sy0-501.html
2.|2018 Latest SY0-501 Exam Questions & Answers Download:
https://drive.google.com/drive/folders/1Mto9aYkbmrvlHB5IFqCx-MuIqEVJQ9Yu?usp=sharing
QUESTION 352
A web developers improves client access to the company’s REST API. Authentication needs to be tokenized but not expose the client’s password. Which of the following methods would BEST meet the developer’s requirements?
A. SAML
B. LDAP
C. OAuth
D. Shibboleth
Answer: A
QUESTION 353
A vulnerability scan is being conducted against a desktop system. The scan is looking for files, versions, and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?
A. Non-intrusive
B. Authenticated
C. Credentialed
D. Active
Answer: C
QUESTION 354
A security analyst is updating a BIA document. The security analyst notices the support vendor’s time to replace a server hard drive went from eight hours to two hours. Given these new metrics, which of the following can be concluded? (Select TWO)
A. The MTTR is faster.
B. The MTTR is slower.
C. The RTO has increased.
D. The RTO has decreased.
E. The MTTF has increased.
F. The MTTF has decreased.
Answer: AD
QUESTION 355
Which of the following could help detect trespassers in a secure facility? (Select TWO)
A. Faraday cages
B. Motion-detection sensors
C. Tall, chain-link fencing
D. Security guards
E. Smart cards
Answer: BD
QUESTION 356
The IT department is deploying new computers. To ease the transition, users will be allowed to access their old and new systems. The help desk is receive reports that users are experiencing the following error when attempting to log in to their previous system:
Logon Failure: Access Denied
Which of the following can cause this issue?
A. Permission issues
B. Access violations
C. Certificate issues
D. Misconfigured devices
Answer: C
QUESTION 357
A third-party penetration testing company was able to successfully use an ARP cache poison technique to gain root access on a server. The tester successfully moved to another server that was not in the original network. Which of the following is the MOST likely method used to gain access to the other host?
A. Backdoor
B. Pivoting
C. Persistance
D. Logic bomp
Answer: B
QUESTION 358
Ann, a security administrator, wants to ensure credentials are encrypted in transit when implementing a RADIUS server for SSO. Which of the following are needed given these requirements? (Select TWO)
A. Public key
B. Shared key
C. Elliptic curve
D. MD5
E. Private key
F. DES
Answer: AE
QUESTION 359
The POODLE attack is a MITM exploit that affects:
A. TLS1.0 with CBC mode cipher.
B. SSLv2.0 with CBC mode cipher,
C. SSLv3.0 with CBC mode cipher.
D. SSLv3.0 with ECB mode cipher.
Answer: B
QUESTION 360
To determine the ALE of a particular risk, which of the following must be calculated? (Select TWO).
A. ARO
B. ROI
C. RPO
D. SLE
E. RTO
Answer: AD
QUESTION 361
Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO)
A. XOR
B. PBKDF2
C. bcrypt
D. HMAC
E. RIPEMD
Answer: BC
QUESTION 362
Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-factor authentication to improve security. Which of the following authentication methods should be deployed to achieve this goal?
A. PIN
B. Security question
C. Smart card
D. Passphrase
E. CAPTCHA
Answer: C
!!!RECOMMEND!!!
1.|2018 Latest SY0-501 Exam Dumps (PDF & VCE) 563Q Download:
https://www.braindump2go.com/sy0-501.html
2.|2018 Latest SY0-501 Study Guide Video: