SY0-501 Latest Exam (May 2018)

[Free] 2018(May) EnsurePass Pass4sure CompTIA SY0-501 Dumps with VCE and PDF 31-40

May 2, 2018 : Ensure you pass the IT Exams
2018 May CompTIA Official New Released SY0-501
100% Free Download! 100% Pass Guaranteed!

CompTIA Security Certification Exam

Question No: 31


A security administrator is given the security and availability profiles for servers that are being deployed.

Match each RAID type with the correct configuration and MINIMUM number of drives.

Review the server profiles and match them with the appropriate RAID type based on integrity, availability, I/O, storage requirements. Instructions:

All drive definitions can be dragged as many times as necessary

Not all placeholders may be filled in the RAID configuration boxes

If parity is required, please select the appropriate number of parity checkboxes

Server profiles may be dragged only once

Server profiles may be dragged only once

Server profiles may be dragged only once

EnsurePass 2018 PDF and VCE


EnsurePass 2018 PDF and VCE

Question No: 32

When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select TWO).

  1. USB-attached hard disk

  2. Swap/pagefile

  3. Mounted network storage

  4. ROM

  5. RAM

Answer: AD

Question No: 33

Which of the following encryption methods does PKI typically use to securely protect keys?

  1. Elliptic curve

  2. Digital signatures

  3. Asymmetric

  4. Obfuscation

Answer: C

Question No: 34

A security analyst is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should the analyst recommend and configure?

  1. Kerberos services

  2. NTLM services

  3. CHAP services

  4. none of the above

Answer: C

Question No: 35

A company is currently using the following configuration:

-IAS server with certificate-based EAP-PEAP and MSCHAP

-Unencrypted authentication via PAP

A security administrator needs to configure a new wireless setup with the following configurations:

-PAP authentication method

-PEAP and EAP provide two-factor authentication

Which of the following forms of authentication are being used? (Select TWO).

  1. PAP

  2. PEAP



  5. EAP


Answer: EF

Question No: 36

A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?

  1. A perimeter firewall and IDS

  2. An air gapped compiler network

  3. A honeypot residing in a DMZ

  4. An ad hoc network with NAT

  5. A bastion host

Answer: C

Question No: 37

A company is using a mobile device deployment model in which employees use their personal devices for work at their own discretion. Some of the problems the company is encountering include the following:

-There is no standardization.

-Employees ask for reimbursement for their devices.

-Employees do not replace their devices often enough to keep them running efficiently.

-The company does not have enough control over the devices.

Which of the following is a deployment model that would help the company overcome these problems?

  1. BYOD

  2. VDI

  3. COPE

  4. CYOD

Answer: C

Question No: 38

When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:

  1. system sprawl.

  2. end-of-life systems

  3. resource exhaustion

  4. a default configuration

Answer: C

Question No: 39

An organization finds that most help desk calls ate regarding account lockout due to a variety of applications running on different systems. Manager is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?

  1. Create multiple application accounts for each user.

  2. Provide secure tokens.

  3. Implement SSO.

  4. Utilize role-based access control.

Answer: B

Question No: 40

An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment DNSSEC at the organization?

  1. TPM

  2. TLS

  3. SSL

  4. PW

Answer: C

100% Ensurepass Free Download!
Download Free Demo:SY0-501 Demo PDF
100% Ensurepass Free Guaranteed!
SY0-501 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No