SY0-501 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam

Question No.11

Which of the following BEST describes an important security advantage yielded by implementing vendor diversity?

  1. Sustainability

  2. Homogeneity

  3. Resiliency

  4. Configurability

Correct Answer: C

Question No.12

An organization#39;s internal auditor discovers that large sums of money have recently been paid to a vendor that management does not recognize. The IT security department is asked to investigate the organizations the organization#39;s ERP system to determine how the accounts payable module has been used to make these vendor payments.

The IT security department finds the following security configuration for the accounts payable module:


Which of the following changes to the security configuration of the accounts payable module would BEST mitigate the risk?






Correct Answer: A

Question No.13

After a user reports slow computer performance, a system administrator detects a suspicious file, which was installed as part of a freeware software package. The systems administrator reviews

the output below:


Based on the above information, which of the following types of malware was installed on the user#39;s computer?

  1. RAT

  2. Keylogger

  3. Spyware

  4. Worm

  5. Bot

Correct Answer: A

Question No.14

Users report the following message appears when browsing to the company#39;s secure site: This website cannot be trusted.

Which of the following actions should a security analyst take to resolve these messages? (Select two.)

  1. Verify the certificate has not expired on the server.

  2. Ensure the certificate has a .pfx extension on the server.

  3. Update the root certificate into the client computer certificate store.

  4. Install the updated private key on the web server.

  5. Have users clear their browsing history and relaunch the session.

Correct Answer: AC

Question No.15


You have just received some room and WiFi access control recommendations from a security consulting company. Click on each building to bring up available security controls.

Please implement the following requirements:


The Chief Executive Officer#39;s (CEO) office had multiple redundant security measures installed on the door to the office. Remove unnecessary redundancies to deploy three- factor authentication, while retaining the expensive iris render.


The Public Cafe has wireless available to customers. You need to secure the WAP with WPA and place a passphrase on the customer receipts.


In the Data Center you need to include authentication from the quot;something you knowquot; category and take advantage of the existing smartcard reader on the door.


In the Help Desk Office you need to require single factor authentication through the use of physical tokens given to guests by the receptionist.


The PII Office has redundant security measures in place. You need to eliminate the redundancy

while maintaining three-factor authentication and retaining the more expensive controls.



The original security controls for each office can be reset at anytime by selecting the Reset button. Once you have met the above requirements for each office, select the Save button.

When you have completed the entire simulation, please select the Done button to submit. Once the simulation is submitted, please select the Next button to continue.




Correct Answer: Please refer to the Explanation part to solve this sim.


Use the following to get this sim work as:




Question No.16


You have been tasked with designing a security plan for your company. Drag and drop the appropriate security controls on the floor plan.


All objects must be used and all place holders must be filled. Order does not matter. When you have completed the simul- ation, please select the Done button to submit.


Correct Answer:


Question No.17

A company is developing a new secure technology and requires computers being used for development to be isolated. Which of the following should be implemented to provide the MOST secure environment?

  1. A perimeter firewall and IDS

  2. An air gapped computer network

  3. A honeypot residing in a DMZ

  4. An ad hoc network with NAT

  5. A bastion host

Correct Answer: B

Question No.18

An incident responder receives a call from a user who reports a computer is exhibiting symptoms consistent with a malware infection. Which of the following steps should the responder perform NEXT?

  1. Capture and document necessary information to assist in the response.

  2. Request the user capture and provide a screenshot or recording of the symptoms.

  3. Use a remote desktop client to collect and analyze the malware in real time.

  4. Ask the user to back up files for later recovery.

Correct Answer: A

Question No.19

Two users need to send each other emails over unsecured channels. The system should support the principle of non-repudiation. Which of the following should be used to sign the user#39;s certificates?

  1. RA

  2. CA

  3. CRL

  4. CSR

Correct Answer: B

Question No.20

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:


All access must be correlated to a user account.



All user accounts must be assigned to a single individual. User access to the PHI data must be recorded.



Anomalies in PHI data access must be reported. Logs and records cannot be deleted or modified.

Which of the following should the administrator implement to meet the above requirements? (Select three.)

  1. Eliminate shared accounts.

  2. Create a standard naming convention for accounts.

  3. Implement usage auditing and review.

  4. Enable account lockout thresholds.

  5. Copy logs in real time to a secured WORM drive.

  6. Implement time-of-day restrictions.

  7. Perform regular permission audits and reviews.

Correct Answer: ACG

Get Full Version of SY0-501 Dumps