SY0-501 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Exam

Question No.71

A company is currently using the following configuration:



IAS server with certificate-based EAP-PEAP and MSCHAP Unencrypted authentication via PAP

A security administrator needs to configure a new wireless setup with the following configurations:


PAP authentication method


PEAP and EAP provide two-factor authentication

Which of the following forms of authentication are being used? (Select two.)

  1. PAP

  2. PEAP



  5. EAP


Correct Answer: AC

Question No.72

Joe, an employee, wants to show his colleagues how much he knows about smartphones. Joe demonstrates a free movie application that he installed from a third party on his corporate smartphone. Joe#39;s colleagues were unable to find the application in the app stores. Which of the following allowed Joe to install the application? (Select two.)

  1. Near-field communication.

  2. Rooting/jailbreaking

  3. Ad-hoc connections

  4. Tethering

  5. Sideloading

Correct Answer: BE

Question No.73

Which of the following can be provided to an AAA system for the identification phase?

  1. Username

  2. Permissions

  3. One-time token

  4. Private certificate

Correct Answer: A

Question No.74

A company is terminating an employee for misbehavior. Which of the following steps is MOST important in the process of disengagement from this employee?

  1. Obtain a list of passwords used by the employee.

  2. Generate a report on outstanding projects the employee handled.

  3. Have the employee surrender company identification.

  4. Have the employee sign an NDA before departing.

Correct Answer: C

Question No.75

When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)

  1. USB-attached hard disk

  2. Swap/pagefile

  3. Mounted network storage

  4. ROM

  5. RAM

Correct Answer: BE

Question No.76

A company#39;s user lockout policy is enabled after five unsuccessful login attempts. The help desk notices a user is repeatedly locked out over the course of a workweek. Upon contacting the user, the help desk discovers the user is on vacation and does not have network access. Which of the following types of attacks are MOST likely occurring? (Select two.)

  1. Replay

  2. Rainbow tables

  3. Brute force

  4. Pass the hash

  5. Dictionary

Correct Answer: CE

Question No.77

An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following configuration options should the administrator select for the new wireless router?


  2. WPA2 CCMP


  4. WPA2 TKIP

Correct Answer: D

Question No.78


Select the appropriate attack from each drop down list to label the corresponding illustrated attack.


Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit.


Correct Answer:


Question No.79

Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?

  1. Error handling to protect against program exploitation

  2. Exception handling to protect against XSRF attacks.

  3. Input validation to protect against SQL injection.

  4. Padding to protect against string buffer overflows.

Correct Answer: C

Question No.80

An attacker compromises a public CA and issues unauthorized X.509 certificates for In the future, wants to mitigate the impact of similar incidents. Which of the following would assist with its goal?

  1. Certificate pinning

  2. Certificate stapling

  3. Certificate chaining

  4. Certificate with extended validation

Correct Answer: A

Get Full Version of SY0-501 Dumps