This page was exported from Braindump2go Updated Real Microsoft MCITP Exam Questions [ http://www.mcitpguides.com ] Export date:Tue Sep 17 12:52:21 2019 / +0000 GMT ___________________________________________________ Title: [June-2018-New]Free CompTIA 563Q SY0-501 VCE and PDF Exam Dumps Braindump2go Offers[286-296] --------------------------------------------------- 2018 June Latest CompTIA SY0-501 Exam Dumps with PDF and VCE Just Updated Today! Following are some new SY0-501 Real Exam Questions: 1.|2018 Latest SY0-501 Exam Dumps (PDF & VCE) 563Q Download:https://www.braindump2go.com/sy0-501.html2.|2018 Latest SY0-501 Exam Questions & Answers Download:https://drive.google.com/drive/folders/1Mto9aYkbmrvlHB5IFqCx-MuIqEVJQ9Yu?usp=sharingQUESTION 286An organization is trying to decide which type of access control is most appropriate for the network. The current access control approach is too complex and requires significant overhead. Management would like to simplify the access control and provide user with the ability to determine what permissions should be applied to files, document, and directories. The access control method that BEST satisfies these objectives is:A. Rule-based access controlB. Role-based access controlC. Mandatory access controlD. Discretionary access controlAnswer: DQUESTION 287While reviewing the security controls in place for a web-based application, a security controls assessor notices that there are no password strength requirements in place. Because of this vulnerability, passwords might be easily discovered using a brute force attack. Which of the following password requirements will MOST effectively improve the security posture of the application against these attacks? (Select two)A. Minimum complexityB. Maximum age limitC. Maximum lengthD. Minimum lengthE. Minimum age limitF. Minimum re-use limitAnswer: ADQUESTION 288A security administrator determined that users within the company are installing unapproved software. Company policy dictates that only certain applications may be installed or ran on the user's computers without exception. Which of the following should the administrator do to prevent all unapproved software from running on the user's computer?A. Deploy antivirus software and configure it to detect and remove pirated softwareB. Configure the firewall to prevent the downloading of executable filesC. Create an application whitelist and use OS controls to enforce itD. Prevent users from running as administrator so they cannot install software.Answer: CQUESTION 289A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility. Which of the following configuration commands should be implemented to enforce this requirement?A. LDAP server 10.55.199.3B. CN=company, CN=com, OU=netadmin, DC=192.32.10.233C. SYSLOG SERVER 172.16.23.50D. TACAS server 192.168.1.100Answer: BQUESTION 290A website administrator has received an alert from an application designed to check the integrity of the company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon further investigation, the media appears to be the same as it was before the alert. Which of the following methods has MOST likely been used?A. CryptographyB. Time of check/time of useC. Man in the middleD. Covert timingE. SteganographyAnswer: EQUESTION 291An attacker captures the encrypted communication between two parties for a week, but is unable to decrypt the messages. The attacker then compromises the session key during one exchange and successfully compromises a single message. The attacker plans to use this key to decrypt previously captured and future communications, but is unable to. This is because the encryption scheme in use adheres to:A. Asymmetric encryptionB. Out-of-band key exchangeC. Perfect forward secrecyD. Secure key escrowAnswer: CQUESTION 292Many employees are receiving email messages similar to the one shown below:From IT departmentTo employeeSubject email quota exceededPease click on the following link http:www.website.info/email.php?quota=1Gb and provide your username and password to increase your email quota. Upon reviewing other similar emails, the security administrator realized that all the phishing URLs have the following common elements; they all use HTTP, they all come from .info domains, and they all contain the same URI. Which of the following should the security administrator configure on the corporate content filter to prevent users from accessing the phishing URL, while at the same time minimizing false positives?A. BLOCK http://www.*.info/"B. DROP http://"website.info/email.php?*C. Redirect http://www,*. Info/email.php?quota=*TOhttp://company.com/corporate_polict.htmlD. DENY http://*.info/email.php?quota=1GbAnswer: DQUESTION 293A security analyst is reviewing the following packet capture of an attack directed at a company's server located in the DMZ: Which of the following ACLs provides the BEST protection against the above attack and any further attacks from the same IP, while minimizing service interruption?A. DENY TCO From ANY to 172.31.64.4B. Deny UDP from 192.168.1.0/24 to 172.31.67.0/24C. Deny IP from 192.168.1.10/32 to 0.0.0.0/0D. Deny TCP from 192.168.1.10 to 172.31.67.4Answer: DQUESTION 294The IT department needs to prevent users from installing untested applications. Which of the following would provide the BEST solution?A. Job rotationB. Least privilegeC. Account lockoutD. AntivirusAnswer: BQUESTION 295An attack that is using interference as its main attack to impede network traffic is which of the following?A. Introducing too much data to a targets memory allocationB. Utilizing a previously unknown security flaw against the targetC. Using a similar wireless configuration of a nearby networkD. Inundating a target system with SYN requestsAnswer: CQUESTION 296An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure exchange of keys. Which of the following algorithms is appropriate for securing the key exchange?A. DESB. BlowfishC. DSAD. Diffie-HellmanE. 3DESAnswer: D!!!RECOMMEND!!!1.|2018 Latest SY0-501 Exam Dumps (PDF & VCE) 563Q Download:https://www.braindump2go.com/sy0-501.html2.|2018 Latest SY0-501 Study Guide Video: YouTube Video: YouTube.com/watch?v=NVxs6ev6Ww0 --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2018-06-05 02:19:45 Post date GMT: 2018-06-05 02:19:45 Post modified date: 2018-06-05 02:19:45 Post modified date GMT: 2018-06-05 02:19:45 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com