CompTIA-SY0-501

Views:
 
Category: Entertainment
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

slide 1:

CompTIA Security+ Certification Exam Version: Demo Total Questions: 10 Web: www.dumpsleader.com Email: supportdumpsleader.com CompTIA SY0-501

slide 2:

IMPORTANT NOTICE Feedback We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions please feel free to contact us at feedbackdumpsleader.com Support If you have any questions about our product please provide the following items: exam code screenshot of the question login id/email please contact us at and our technical experts will provide support within 24 hours. supportdumpsleader.com Copyright The product of each order has its own encryption code so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement.

slide 3:

CompTIA - SY0-501 Valid Questions and Answers 1 of 11 100 Valid Questions - Guaranteed Success Exam Topic Breakdown Exam Topic Number of Questions Topic 5 : Exam Pool E 2 Topic 6 : Exam Pool F New Questions 2 Topic 4 : Exam Pool D 2 Topic 2 : Exam Pool B 2 Topic 3 : Exam Pool C 2 Topic 1 : Exam Pool A 0 TOTAL 10

slide 4:

CompTIA - SY0-501 Valid Questions and Answers 2 of 11 100 Valid Questions - Guaranteed Success A. B. C. D. A. B. C. D. Topic 5 Exam Pool E Question :1 - Exam Topic 5 Ann a customer is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred Ransomware Keylogger Buffer overflow Rootkit Answer: A Question :2 - Exam Topic 5 A forensic expert is given a hard drive from a crime scene and is asked to perform an investigation. Which of the following is the FIRST step the forensic expert needs to take the chain of custody Make a forensic copy Create a hash of the hard rive Recover the hard drive data Update the evidence log Answer: D

slide 5:

CompTIA - SY0-501 Valid Questions and Answers 3 of 11 100 Valid Questions - Guaranteed Success A. B. C. D. E. F. A. B. C. D. E. Topic 6 Exam Pool F New Questions Question :3 - Exam Topic 6 An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared network resources while traveling. They need to be able to travel to and from different locations on a weekly basis. Shared offices are retained at the headquarters location. The remote workforce will have identical file and system access requirements and must also be able to log in to the headquarters location remotely. Which of the following BEST represent how the remote employees should have been set up initially Select TWO. User-based access control Shared accounts Group-based access control Mapped drives Individual accounts Location-based policies Answer: C E Question :4 - Exam Topic 6 A security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff including desktops laptops and mobile devices the applications do not vary by platform. Which of the following should the consultant recommend Select Two. Apply patch management on a daily basis. Allow full functionality for all applications that are accessed remotely Apply default configurations of all operating systems Apply application whitelisting. Disable default accounts and/or passwords. Answer: A E

slide 6:

CompTIA - SY0-501 Valid Questions and Answers 4 of 11 100 Valid Questions - Guaranteed Success A. B. C. D. A. B. C. D. Topic 4 Exam Pool D Question :5 - Exam Topic 4 A consultant has been tasked to assess a clients network. The client reports frequent network outages. Upon viewing the spanning tree configuration the consultant notices that an old and law performing edge switch on the network has been elected to be the root bridge. Which of the following explains this scenario The switch also serves as the DHCP server The switch has the lowest MAC address The switch has spanning tree loop protection enabled The switch has the fastest uplink port Answer: C Question :6 - Exam Topic 4 An attack that is using interference as its main attack to impede network traffic is which of the following Introducing too much data to a targets memory allocation Utilizing a previously unknown security flaw against the target Using a similar wireless configuration of a nearby network Inundating a target system with SYN requests Answer: C

slide 7:

CompTIA - SY0-501 Valid Questions and Answers 5 of 11 100 Valid Questions - Guaranteed Success A. B. C. D. Topic 2 Exam Pool B Question :7 - Exam Topic 2 A mobile device user is concerned about geographic positioning information being included in messages sent between users on a popular social network platform. The user turns off the functionality in the application but wants to ensure the application cannot re-enable the setting without the knowledge of the user. Which of the following mobile device capabilities should the user disable to achieve the stated goal Device access control Location based services Application control GEO-Tagging Answer: D Question :8 - Exam Topic 2 A security administrator is given the security and availability profiles for servers that are being deployed. Match each RAID type with the correct configuration and MINIMUM number of drives. Review the server profiles and match them with the appropriate RAID type based on integrity availability I/O storage requirements. Instructions: All drive definitions can be dragged as many times as necessary Not all placeholders may be filled in the RAID configuration boxes If parity is required please select the appropriate number of parity checkboxes Server profiles may be dragged only once If at any time you would like to bring back the initial state of the simulation please select the Reset button. When you have completed the simulation please select the Done button to submit. Once the simulation is submitted please select the Next button to continue.

slide 8:

CompTIA - SY0-501 Valid Questions and Answers 6 of 11 100 Valid Questions - Guaranteed Success Answer:

slide 9:

CompTIA - SY0-501 Valid Questions and Answers 7 of 11 100 Valid Questions - Guaranteed Success Explanation

slide 10:

CompTIA - SY0-501 Valid Questions and Answers 8 of 11 100 Valid Questions - Guaranteed Success RAID-0 is known as striping. It is not a fault tolerant solution but does improve disk performance for read/write operations. Striping requires a minimum of two disks and does not use parity. RAID-0 can be used where performance is required over fault tolerance such as a media streaming server. RAID-1 is known as mirroring because the same data is written to two disks so that the two disks have identical data. This is a fault tolerant solution that halves the storage space. A minimum of two disks are used in mirroring and does not use parity. RAID-1 can be used where fault tolerance is required over performance such as on an authentication server. RAID-5 is a fault tolerant solution that uses parity and striping. A minimum of three disks are required for RAID-5 with one disks worth of space being used for parity information. However the parity information is distributed across all the disks. RAID-5 can recover from a sing disk failure. RAID-6 is a fault tolerant solution that uses dual parity and striping. A minimum of four disks are required for RAID-6. Dual parity allows RAID-6 to recover from the simultaneous failure of up to two disks. Critical data should be stored on a RAID-6 system.

slide 11:

CompTIA - SY0-501 Valid Questions and Answers 9 of 11 100 Valid Questions - Guaranteed Success http://www.adaptec.com/en-us/solutions/raid_levels.html

slide 12:

CompTIA - SY0-501 Valid Questions and Answers 10 of 11 100 Valid Questions - Guaranteed Success A. B. C. D. A. B. C. D. Topic 3 Exam Pool C Question :9 - Exam Topic 3 A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even during an extended internet outage. Which of the following should be implemented Recovery agent Ocsp Crl Key escrow Answer: B Question :10 - Exam Topic 3 A system administrator needs to implement 802.1x whereby when a user logs into the network the authentication server communicates to the network switch and assigns the user to the proper VLAN. Which of the following protocols should be used RADIUS Kerberos LDAP MSCHAP Answer: A

slide 13:

CompTIA - SY0-501 Valid Questions and Answers 11 of 11 100 Valid Questions - Guaranteed Success Topic 1 Exam Pool A

slide 14:

About dumpsleader.com dumpsleader.com was founded in 2007. We provide latest high quality IT / Business Certification Training Exam Questions Study Guides Practice Tests. We help you pass any IT / Business Certification Exams with 100 Pass Guaranteed or Full Refund. Especially Cisco CompTIA Citrix EMC HP Oracle VMware Juniper Check Point LPI Nortel EXIN and so on. View list of all certification exams: All vendors We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below. Sales: salesdumpsleader.com Feedback: feedbackdumpsleader.com Support: supportdumpsleader.com Any problems about IT certification or our products You can write us back and we will get back to you within 24 hours.

authorStream Live Help