[Free] 2019(Oct) EnsurePass CompTIA SY0-501 Dumps with VCE and PDF 81-90

Get Full Version of the Exam
http://www.EnsurePass.com/SY0-501.html

Question No.81

A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?

  1. Transferring the risk

  2. Accepting the risk

  3. Avoiding the risk

  4. Migrating the risk

Correct Answer: A

Question No.82

Which of the following characteristics differentiate a rainbow table attack from a brute force attack? (Select two.)

  1. Rainbow table attacks greatly reduce compute cycles at attack time.

  2. Rainbow tables must include precomputed hashes.

  3. Rainbow table attacks do not require access to hashed passwords.

  4. Rainbow table attacks must be performed on the network.

  5. Rainbow table attacks bypass maximum failed login restrictions.

Correct Answer: BE

Question No.83

DRAG DROP

A security administrator wants to implement strong security on the company smart phones and

terminal servers located in the data center. Drag and drop the applicable controls to each asset types.

Instructions:

Controls can be used multiple times and not all placeholders need to be filled. When you have completed the simulation, please select the Done button to submit.

image

Correct Answer:

image

Question No.84

A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?

  1. LDAP services

  2. Kerberos services

  3. NTLM services

  4. CHAP services

Correct Answer: B

Question No.85

DRAG DROP

A Security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and Drop the applicable controls to each asset type.

Instructions:

Controls can be used multiple times and not all placeholders needs to be filled. When you have completed the simul-ation, Please select Done to submit.

image

Correct Answer:

image

Question No.86

Which of the following implements two-factor authentication?

  1. A phone system requiring a PIN to make a call

  2. An ATM requiring a credit card and PIN

  3. A computer requiring username and password

  4. A datacenter mantrap requiring fingerprint and iris scan

Correct Answer: B

Question No.87

When trying to log onto a company#39;s new ticketing system, some employees receive the following message:

Access denied: too many concurrent sessions.

The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?

  1. Network resources have been exceeded.

  2. The software is out of licenses.

  3. The VM does not have enough processing power.

  4. The firewall is misconfigured.

Correct Answer: C

Question No.88

In a corporation where compute utilization spikes several times a year, the Chief Information Officer (CIO) has requested a cost-effective architecture to handle the variable capacity demand. Which of the following characteristics BEST describes what the CIO has requested?

  1. Elasticity

  2. Scalability

  3. High availability

  4. Redundancy

Correct Answer: A

Question No.89

A security administrator has found a hash in the environment known to belong to malware. The administrator then finds this file to be in in the preupdate area of the OS, which indicates it was pushed from the central patch system.

image

The administrator pulls a report from the patch management system with the following output:

image

Given the above outputs, which of the following MOST likely happened?

  1. The file was corrupted after it left the patch system.

  2. The file was infected when the patch manager downloaded it.

  3. The file was not approved in the application whitelist system.

  4. The file was embedded with a logic bomb to evade detection.

Correct Answer: D

Question No.90

An application team is performing a load-balancing test for a critical application during off-hours and has requested access to the load balancer to review. Which servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications running on the load balancer. Which of the following is the BEST solution for security analyst to process the request?

  1. Give the application team administrator access during off-hours.

  2. Disable other critical applications before granting the team access.

  3. Give the application team read-only access.

  4. Share the account with the application team.

Correct Answer: C

Get Full Version of the Exam
SY0-501 Dumps
SY0-501 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *