Master the SY0-501 CompTIA Security+ content and be ready for exam day success quickly with this Actualtests SY0-501 free exam. We guarantee it!We make it a reality and give you real SY0-501 questions in our CompTIA SY0-501 braindumps.Latest 100% VALID CompTIA SY0-501 Exam Questions Dumps at below page. You can use our CompTIA SY0-501 braindumps and pass your exam.

Q17. An application team is performing a load-balancing test for a critical application during off- hours and has requested access to the load balancer to review which servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications running on the load balancer. Which of the following is the BEST solution for security analyst to process the request?

A. Give the application team administrator access during off-hours.

B. Disable other critical applications before granting the team access.

C. Give the application team read-only access.

Answer: A


Q18. DRAG DROP

Drag and drop the correct protocol to its default port.

Answer:

Explanation:

FTP uses TCP port 21. Telnet uses port 23.

SSH uses TCP port 22. All protocols encrypted by SSH, including SFTP, SHTTP, SCP, SExec, and slogin, also use TCP port 22. Secure Copy Protocol (SCP) is a secure file- transfer facility based on SSH and Remote Copy Protocol (RCP). Secure FTP (SFTP) is a secured alternative to standard File Transfer Protocol (FTP).

SMTP uses TCP port 25.

Port 69 is used by TFTP.

SNMP makes use of UDP ports 161 and 162.

References:

Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 42, 45, 51

http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers


Q19. Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?

A. The recipient can verify integrity of the software patch.

B. The recipient can verify the authenticity of the site used to download the patch.

C. The recipient can request future updates to the software using the published MD5 value.

D. The recipient can successfully activate the new software patch.

Answer: A


Q20. Which of the following attacks specifically impact data availability?

A. DDoS

B. Trojan

C. MITM

D. Rootkit

Answer: A


Q21. An organization finds that most help desk calls are regarding account lockout due to a variety of applications running on different systems. Management is looking for a solution to reduce the number of account lockouts while improving security. Which of the following is the BEST solution for this organization?

A. Create multiple application accounts for each user.

B. Provide secure tokens.

C. Implement SSO.

D. Utilize role-based access control.

Answer: C


Q22. Which of the following implements two-factor authentication?

A. A phone system requiring a PIN to make a call

B. At ATM requiring a credit card and PIN

C. A computer requiring username and password

D. A datacenter mantrap requiring fingerprint and iris scan

Answer: B


Q23. When trying to log onto a company’s new ticketing system, some employees receive the following message: Access denied: too many concurrent sessions. The ticketing system was recently installed on a small VM with only the recommended hardware specifications. Which of the following is the MOST likely cause for this error message?

A. Network resources have been exceeded.

B. The software is out of licenses.

C. The VM does not have enough processing power.

D. The firewall is misconfigured.

Answer: C


Q24. An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?

A. Capture and document necessary information to assist in the response.

B. Request the user capture and provide a screenshot or recording of the symptoms.

C. Use a remote desktop client to collect and analyze the malware in real time.

D. Ask the user to back up files for later recovery.

Answer: C