Exam SY0-501 study materials Dumps PDF

Exam SY0-501 study materials Dumps PDF

certasap SY0-501 CompTIA Security+

not yet rated
Author: jack bob
Length: 1-43 page(s)
Written: Apr 2019
Sales Rank: - XinXii Sales Rank
Views: 38

Category: Computer & IT » Databases  |  Work: Guidebook
Keywords: SY0-501 Practice Exam, SY0-501 study materials, SY0-501 Dumps, SY0-501 Study Guide, SY0-501 Questions and Answers, Exam SY0-501, SY0-501 Practice test

it certification SY0-501 Study Guide Practice Exam Questions and Answers

SY0-501 Questions Guarantee-certasap.com
Our CompTIA Security+ SY0-501 real exam questions can guarantee you success in the first attempt. If you fail CompTIA Security+ SY0-501 exam with our product, you can get full payment fee refund with the screenshot of your failed score report in THREE months.

www.certasap.com 'Success of our customers and our products goes side by side'
Time is the most important element for our customers so we keep that in mind while preparing our CompTIA Security+ SY0-501 CompTIA Security+ practice tests. Senior IT Professionals put in a lot of effort in ensuring this. Ongoing improvement in our real questions and answers of CompTIA Security+ SY0-501 Certified Authorization Professional and services is a part of our mission.

CompTIA Security+ SY0-501

Products Description

Exam Number/Code:SY0-501

Exam Name:CompTIA Security+

Version:V16.99

Questions and Answers:209 Q&As


Exam questions:

Q1
A security analyst wishes to increase the security of an FTP server. Currently, all trails to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modem FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?

A. Require the SFTP protocol to connect to the file server.
B. Use implicit TLS on the FTP server.
C. Use explicit FTPS for the connections.
D. Use SSH tunneling to encrypt the FTP traffic.

Answer: B


Q2
A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords, The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? (Select TWO)

A. The portal will function as an identity provider and issue an authentication assertion
B. The portal will request an authentication ticket from each network that is transitively trusted
C. The back-end networks will function as an identity provider and issue an authentication assertion
D. The back-end networks will request authentication tickets from the portal, which will act as the third-party service provider authentication store
E. The back-end networks will verify the assertion token issued by the portal functioning as the identity provider

Answer: BC


Q3
Which of the following would a security specialist be able to determine upon examination of a server's certificate?

A. CA public key
B. Server private key
C. CSR
D. OID

Answer: B

Q4
A security consultant discovers that an organization is using the PCL protocol to print documents, utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?

A. An attacker can access and change the printer configuration.
B. SNMP data leaving the printer will not be properly encrypted.
C. An MITM attack can reveal sensitive information.
D. An attacker can easily inject malicious code into the printer firmware.
E. Attackers can use the PCL protocol to bypass the firewall of client computers.

Answer: A

Q5
A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select TWO).

A. Generate an X 509-complaint certificate that is signed by a trusted CA.
B. Install and configure an SSH tunnel on the LDAP server.
C. Ensure port 389 is open between the clients and the servers using the communication.
D. Ensure port 636 is open between the clients and the servers using the communication.
E. Remove the LDAP directory service role from the server.

Answer: A,B


Seller assumes all responsibility for this listing.

About the Author


Member since: Jan 2019
Publications on XinXii:  16
certasap.com Practice Exam Questions and Answers study materials
~

No review yet.

Back