When considering loT systems, which of the following represents the GREATEST ongoing risk after a vulnerability has been discovered?
A. Difficult-to-update firmware
B. Tight integration to existing systems
C. IP address exhaustion
D. Not using industry standards
Which of the following would provide a safe environment for an application to access only the resources needed to function while not having access to run at the system level?
A. Sandbox
B. Honeypot
C. GPO
D. DMZ
Which of the following algorithms would be used to provide non-repudiation of a file transmission?
A. AES
B. RSA
C. MD5
D. SHA
A security administrator is implementing a new WAF solution and has placed some of the web servers behind the WAF, with the WAF set to audit mode. When reviewing the audit logs of external requests and posts to the web servers, the
administrator finds the following entry:
Based on this data, which of the following actions should the administrator take?
A. Alert the web server administrators to a misconfiguration
B. Create a blocking policy based on the parameter values
C. Change the parameter name 'Account_Name' identified in the log.
D. Create an alert to generate emails for abnormally high activity.
If two employees are encrypting traffic between them using a single encryption key, which of the following algorithms are they using?
A. RSA
B. 3DES
C. DSA
D. SHA-2
A security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective?
A. A reverse proxy
B. A decryption certificate
C. A split-tunnel VPN
D. Load-balanced servers
An incident response analyst at a large corporation is reviewing proxy log data.
The analyst believes a malware infection may have occurred. Upon further review, the analyst determines the computer responsible for the suspicious network traffic is used by the Chief Executive Officer (CEO). Which of the following is the
best NEXT step for the analyst to take?
A. Call the CEO directly to ensure awareness of the event
B. Run a malware scan on the CEO's workstation
C. Reimage the CEO's workstation
D. Disconnect the CEO's workstation from the network.
Which of the following are the BEST selection criteria to use when assessing hard drive suitability for time-sensitive applications that deal with large amounts of critical information? (Select TWO).
A. MTBF
B. MTTR
C. SLA
D. RTO
E. MTTF
F. RPO
Which of the following is a technical preventive control?
A. Two-factor authentication
B. DVR-supported cameras
C. Acceptable-use MOTD
D. Syslog server
A security operations team recently detected a breach of credentials. The team mitigated the risk and followed proper processes to reduce risk. Which of the following processes would BEST help prevent this issue from happening again?
A. Risk assessment
B. Chain of custody
C. Lessons learned
D. Penetration test
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.