A systems administrator recently issued a public/private key pair that will be used tor the company's DNSSEC implementation. Which of the following configurations should the systems administrator implement NEXT?
A. Create DNSKEY resources with the public key.
B. instant private key using the RRSIG record
C. Point the OS record to the company authoritative servers
D. Add TCP port 443 to the DNS listener
A security administrator plans to conduct a vulnerability scan on the network to determine if system applications are up to date. The administrator wants to limit disruptions to operations but not consume too many resources. Which of the following types of vulnerability scans should be conducted?
A. Credentialed
B. Non-Intrusive
C. SYN
D. Port
Joe a new employee, discovered a thumb drive with the company's logo on it while walking in the parking lot Joe was curious as to the contents of the drive and placed it into his work computer. Shortly after accessing the contents, he noticed the machine was running slower, started to reboot, and displayed new icons on the screen. Which of the following types of attacks occurred?
A. Social engineering
B. Brute force attack
C. MITM
D. DoS
A network technician discovered the usernames and passwords used for network device configuration have been compromised by a user with a packet sniffer. Which of the following would secure the credentials from sniffing?
A. Implement complex passwords.
B. Use SSH for remote access.
C. Configure SNMPv2 for device management.
D. Use TFTP to copy device configuration.
A company has users and porters in multiple geographic locations and the printers are locked in common areas of the offices. To preserve the confidentially of PII, a security administrator needs to implement the appropriate controls. Which of the following would BEST meet the confidentiality requirements of the data?
A. Enforcing location-based policy restrictions
B. Adding location to the standard naming convention
C. implementing time-of-day restrictions based on location
D. Conducting regular account maintenance at each location
A company uses WPA2-PSK, and it appears there are multiple unauthorized connected to the wireless network. A technician suspects this is because the wireless passwords has been shared with unauthorized individuals. Which of the following should the technician implement to BEST reduce the risk of this happening in the future?
A. Wireless guest isolation
B. 802.1X
C. WPS
D. MAC address blacklist
An organization is updating its access control standards for SSL VPN login to include multifactor authentication The security administrator assigned to this project has been given the following guidelines to use when selecting a solution
High security Lowest false acceptance rate Quick provisioning time for remote users and offshore consultants
Which of the following solutions will BEST fit this organization's requirements?
A. AES-256 key fobs
B. Software tokens
C. Fingerprint scanners
D. Iris scanners
A security analyst is investigating a security breach involving the loss of sensitive data. A user passed the information through social media as vacation photos. Which of the following methods was used to encode the data?
A. Obfuscation
B. Steganography
C. Hashing
D. Elliptic curve
A technician wants to add wireless guest capabilities to an enterprise wireless network that is currently implementing 802.1X EAP-TLS The guest network must
Support client Isolation.
Issue a unique encryption key to each client.
Allow guests to register using their personal email addresses
Which of the following should the technician implement? (Select TWO),
A. RADIUS Federation
B. Captive portal
C. EAP-PEAP
D. WPA2-PSK
E. A separate guest SSID
F. P12 certicate format
Which of the following is an example of the second A in the AAA model?
A. The encryption protocol successfully completes the handshake and establishes a connection
B. The one-time password is keyed in, and the login system grants access.
C. The event log records a successful login with a type code that indicates an interactive login.
D. A domain controller confirms membership in the appropriate group
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.