0% found this document useful (0 votes)
17 views12 pages

SY0-501 Exam - Free Actual Q&As, Page 25 - ExamTopics

SY0-501

Uploaded by

bilalwad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views12 pages

SY0-501 Exam - Free Actual Q&As, Page 25 - ExamTopics

SY0-501

Uploaded by

bilalwad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #241 Topic 1

A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even during an extended

internet outage.

Which of the following should be implemented?

A. Recovery agent

B. Ocsp

C. Crl

D. Key escrow

Correct Answer: C

Question #242 Topic 1

An administrator intends to configure an IPSec solution that provides ESP with integrity protection, but not confidentiality protection.

Which of the following AES modes of operation would meet this integrity-only requirement?

A. HMAC

B. PCBC

C. CBC

D. GCM

E. CFB

Correct Answer: A

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 1/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #243 Topic 1

The chief security officer (CS0) has issued a new policy that requires that all internal websites be configured for HTTPS traffic only. The network

administrator has been tasked to update all internal sites without incurring additional costs.

Which of the following is the best solution for the network administrator to secure each internal website?

A. Use certificates signed by the company CA

B. Use a signing certificate as a wild card certificate

C. Use certificates signed by a public ca

D. Use a self-signed certificate on each internal server

Correct Answer: A

This is a way to update all internal sites without incurring additional costs?

To be a CA (Certificate Authority), you need an infrastructure that consists of considerable operational elements, hardware, software, policy

frameworks and practice statements, auditing, security infrastructure and personnel.

Question #244 Topic 1

A security program manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime

requirement or active user base.

Which of the following methods will produce a report which shows vulnerabilities that were actually exploited?

A. Peer review

B. Component testing

C. Penetration testing

D. Vulnerability testing

Correct Answer: C

A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities.

Question #245 Topic 1

A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called

"Purchasing", however, the purchasing group permissions allow write access.

Which of the following would be the BEST course of action?

A. Modify all the shared files with read only permissions for the intern.

B. Create a new group that has only read permissions for the files.

C. Remove all permissions for the shared files.

D. Add the intern to the "Purchasing" group.

Correct Answer: B

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 2/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #246 Topic 1

A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a

high amount of wireless mobile use is expected.

To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of

having the laptops compromised?

A. MAC filtering

B. Virtualization

C. OS hardening

D. Application white-listing

Correct Answer: C

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 3/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #247 Topic 1

DRAG DROP -

Task: Determine the types of attacks below by selecting an option from the dropdown list.

Select and Place:

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 4/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Correct Answer:

A: Phishing is the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user

into surrendering private information that will be used for identity theft.

Phishing email will direct the user to visit a website where they are asked to update personal information, such as a password, credit card,

social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and set up only to steal

the information the user enters on the page.

B: Whaling is a specific kind of malicious hacking within the more general category of phishing, which involves hunting for data that can be

used by the hacker. In general, phishing efforts are focused on collecting personal data about users. In whaling, the targets are high-ranking

bankers, executives or others in powerful positions or job titles. Hackers who engage in whaling often describe these efforts as "reeling in a big

fish," applying a familiar metaphor to the process of scouring technologies for loopholes and opportunities for data theft. Those who are

engaged in whaling may, for example, hack into specific networks where these powerful individuals work or store sensitive data. They may also

set up keylogging or other malware on a work station associated with one of these executives. There are many ways that hackers can pursue

whaling, leading C-level or top-level executives in business and government to stay vigilant about the possibility of cyber threats.

C: Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity

theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit.

D: SPIM is a term sometimes used to refer to spam over IM (Instant Messaging). It's also called just spam, instant spam, or IM marketing. No

matter what the name, it consists of unwanted messages transmitted through some form of instant messaging service, which can include

Short Message Service (SMS)

E: Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking

people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter. A social engineer runs

what used to be called a "con game." For example, a person using social engineering to break into a computer network might try to gain the

confidence of an authorized user and get them to reveal information that compromises the network's security. Social engineers often rely on the

natural helpfulness of people as well as on their weaknesses. They might, for example, call the authorized employee with some kind of urgent

problem that requires immediate network access. Appealing to vanity, appealing to authority, appealing to greed, and old-fashioned

eavesdropping are other typical social engineering techniques. http://www.webopedia.com/TERM/P/phishing.html

http://www.techopedia.com/definition/28643/whaling http://www.webopedia.com/TERM/V/vishing.html

http://searchsecurity.techtarget.com/definition/social-engineering

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 5/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #248 Topic 1

SIMULATION -

You have just received some room and WiFi access control recommendations from a security consulting company. Click on each building to bring

up available security controls. Please implement the following requirements:

The Chief Executive Officer's (CEO) office had multiple redundant security measures installed on the door to the office. Remove unnecessary

redundancies to deploy three-factor authentication, while retaining the expensive iris render.

The Public Cafe has wireless available to customers. You need to secure the WAP with WPA and place a passphrase on the customer receipts.

In the Data Center you need to include authentication from the "something you know" category and take advantage of the existing smartcard

reader on the door.

In the Help Desk Office, you need to require single factor authentication through the use of physical tokens given to guests by the receptionist.

The PII Office has redundant security measures in place. You need to eliminate the redundancy while maintaining three-factor authentication and

retaining the more expensive controls.

Instructions: The original security controls for each office can be reset at any time by selecting the Reset button. Once you have met the above

requirements for each office, select the Save button. When you have completed the entire simulation, please select the Done button to submit.

Once the simulation is submitted, please select the Next button to continue.

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 6/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 7/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Correct Answer: See the solution below.

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 8/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 9/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #249 Topic 1

SIMULATION -

Task: Configure the firewall (fill out the table) to allow these four rules:

✑ Only allow the Accounting computer to have HTTPS access to the Administrative server.
✑ Only allow the HR computer to be able to communicate with the Server 2 System over SCP.
Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 10/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Question #250 Topic 1

HOTSPOT -

For each of the given items, select the appropriate authentication category from the dropdown choices.

Instructions: When you have completed the simulation, please select the Done button to submit.

Hot Area:

Correct Answer: Answer:

Something you are includes fingerprints, retina scans, or voice recognition.

Something you have includes smart cards, token devices, or keys.

Something you know includes a password, codes, PINs, combinations, or secret phrases. Somewhere you are including a physical location s or

logical addresses, such as domain name, an IP address, or a MAC address.

Something you do includes your typing rhythm, a secret handshake, or a private knock http://en.wikipedia.org/wiki/

Password_authentication_protocol#Working_cycle http://en.wikipedia.org/wiki/Smart_card#Security

 Previous Questions Next Questions 

Browse atleast 50% to increase passing rate

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 11/12
18/12/2024 08:44 SY0-501 Exam - Free Actual Q&As, Page 25 | ExamTopics

Viewing page 25 out of 114 pages.

Viewing questions 241-250 out of 1132 questions

https://www.examtopics.com/exams/comptia/sy0-501/view/25/ 12/12

You might also like