Question: 1
A security analyst has been asked to perform a review of an organization's software development lifecycle. The analyst reports that the lifecycle does not contain a phase in which team members evaluate and provide critical feedback of another developer's code. Which of the following assessment techniques is BEST described in the analyst's report?
A. Architecture evaluation
B. Baseline reporting
C. Whitebox testing
D. Peer review
Answer: D
Question: 2
An attacker wearing a building maintenance uniform approached a company's receptionist asking for
access to a secure are
A. The receptionist asks for identification, a building access badge and checks the company's list
approved maintenance personnel prior to granting physical access to the secure are. The controls used
by the receptionist are in place to prevent which of the following types of attacks?
A. Tailgating
B. Shoulder surfing
C. Impersonation
D. Hoax
Answer: C
Question: 3
A security administrator is tasked with conducting an assessment made to establish the baseline security posture of the corporate IT infrastructure. The assessment must report actual flaws and weaknesses in the infrastructure. Due to the expense of hiring outside consultants, the testing must be performed using in-house or cheaply available resource. There cannot be a possibility of any requirement being damaged in the test.Which of the following has the administrator been tasked to perform?
A. Risk transference
B. Penetration test
C. Threat assessment
D. Vulnerability assessment
Answer: D
Question: 4
A network administrator is attempting to troubleshoot an issue regarding certificates on a secure
website. During the troubleshooting process, the network administrator notices that the web gateway
proxy on the local network has signed all of the certificates on the local machine. Which of the following describes the type of attack the proxy has been legitimately programmed to perform?
A. Transitive access
B. Spoofing
C. Man-in-the-middle
D. Replay
Answer: C
Question: 5
Which of the following use the SSH protocol?
A. Stelnet
B. SCP
C. SNMP
D. FTPS
E. SSL
F. SFTP
Answer: BF
Related Links
https://www.reddit.com/user/david-rose-5311/comments/f7peeb/want_to_pass_comptia_sy0501_exam_in_first_attempt/
Friday, 21 February 2020
Dumps4Download | Updated SY0-501 Dumps PDF Verified by CompTIA
February 21, 2020
CompTIA SY0-501 Dumps, CompTIA SY0-501 Dumps PDF, CompTIA SY0-501 Exam Study Material, SY0-501 Dumps, SY0-501 Dumps PDF, SY0-501 questions answers, SY0-501 Test Engine
3 comments
Subscribe to:
Post Comments (Atom)
Step By Step Instructions To Get Achievement In Your Outcome For MS-500 Test
We have analyzed and investigated the need for understudies for the arrangement of their tests with the assistance of our esteemed specialis...
EXAM4LEAD.COM has become my permanent exam guide. It offers useful material for exam preparation. I will say thanks to all the experts who are working for this and for providing me SY0-501 DUMPS. My suggestion to all my mates is to use the same exam dumps.
ReplyDeleteI read about SY0-501 dumps in a comment and visit Realexamcollection.com and found it really useful. I am thankful to all the members who have been the part of its creation. In my view, there is no better dumps material than SY0-501 exam dumps.
ReplyDeleteThank you Dumpsforsure.com for coming and training me. This was my second attempt at the SY0-501 Dumps, and I failed miserably on my first attempt to prepare another book. But they are full-fledged heroes, I do it for them. You have increased my confidence. I performed and graduated well on my SY0-501. I didn't just get a promotion at work. Thank you for being there and helping me be successful where I am today. They provide you with the right environment for the test so that fear of the exam room doesn't linger in your head.
ReplyDelete