A security engineer wants to further secure a sensitive VLAN on the network by introducing MFA. Which of the following is the BEST example of this?
A. PSK and PIN
B. RSA token and password
C. Fingerprint scanner and voice recognition
D. Secret question and CAPTCHA
An organization's Chief Executive Officer (CEO) directs a newly hired computer technician to install an OS on the CEO's personal laptop. The technician performs the installation, and a software audit later in the month indicates a violation of the EULA occurred as a result.
Which of the following would address this violation going forward?
A. Security configuration baseline
B. Separation of duties
C. AUP
D. NDA
Which of the following attackers generally possesses minimal technical knowledge to perform advanced attacks and uses widely available tools as well as publicly available information?
A. Hacktivist
B. White hat hacker
C. Script kiddle
D. Penetration tester
A company is performing an analysis of which corporate units are most likely to cause revenue loss in the event the unit is unable to operate. Which of the following is an element of the BIA that this action is addressing?
A. Critical system inventory
B. Single point of failure
C. Continuity of operations
D. Mission-essential functions
A water utility company has seen a dramatic increase in the number of water pumps burning out. A malicious actor was attacking the company and is responsible for the increase.
Which of the following systems has the attacker compromised?
A. DMZ
B. RTOS
C. SCADA
D. IoT
A network technician is setting up a new branch for a company. The users at the new branch will need to access resources securely as if they were at the main location.
Which of the following networking concepts would BEST accomplish this?
A. Virtual network segmentation
B. Physical network segmentation
C. Site-to-site VPN
D. Out-of-band access
E. Logical VLANs
An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared network resources while traveling. They need to be able to travel to and from different locations on a weekly basis. Shared offices are retained at the headquarters location. The remote workforce will have identical file and system access requirements, and must also be able to log in to the headquarters location remotely.
Which of the following BEST represent how the remote employees should have been set up initially? (Choose two.)
A. User-based access control
B. Shared accounts
C. Group-based access control
D. Mapped drives
E. Individual accounts
F. Location-based policies
Which of the following is a random value appended to a credential that makes the credential less susceptible to compromise when hashed?
A. Nonce
B. Salt
C. OTP
D. Block cipher
E. IV
Given the following requirements:
1.
Help to ensure non-repudiation
2.
Capture motion in various formats
Which of the following physical controls BEST matches the above descriptions?
A. Camera
B. Mantrap
C. Security guard
D. Motion sensor
Which of the following is being used when a malicious actor searches various social media websites to find information about a company's system administrators and help desk staff?
A. Passive reconnaissance
B. Initial exploitation
C. Vulnerability scanning
D. Social engineering
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.