Get Full Version of the Exam
http://www.EnsurePass.com/SY0-501.html
Question No.41
A botnet has hit a popular website with a massive number of GRE-encapsulated packets to perform a DDoS attack. News outlets discover a certain type of refrigerator was exploited and used to send outbound packets to the website that crashed. To which of the following categories does the refrigerator belong?
-
SoC
-
ICS
-
IoT
-
MFD
Correct Answer: C
Question No.42
DRAG DROP
A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.
Correct Answer:
Question No.43
Which of the following encryption methods does PKI typically use to securely project keys?
-
Elliptic curve
-
Digital signatures
-
Asymmetric
-
Obfuscation
Correct Answer: C
Question No.44
An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?
-
PEAP
-
EAP
-
WPA2
-
RADIUS
Correct Answer: A
Question No.45
When systems, hardware, or software are not supported by the original vendor, it is a vulnerability known as:
-
system sprawl
-
end-of-life systems
-
resource exhaustion
-
a default configuration
Correct Answer: B
Question No.46
When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured when connecting to WPA2-PSK?
-
DES
-
AES
-
MD5
-
WEP
Correct Answer: B
Question No.47
DRAG DROP
Determine the types of Attacks from right to specific action.
Correct Answer:
Question No.48
Refer to the following code:
Which of the following vulnerabilities would occur if this is executed?
-
Page exception
-
Pointer deference
-
NullPointerException
-
Missing null check
Correct Answer: D
Question No.49
When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects?
-
Owner
-
System
-
Administrator
-
User
Correct Answer: C
Question No.50
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
-
The recipient can verify integrity of the software patch.
-
The recipient can verify the authenticity of the site used to download the patch.
-
The recipient can request future updates to the software using the published MD5 value.
-
The recipient can successfully activate the new software patch.
Correct Answer: A
Get Full Version of the Exam
SY0-501 Dumps
SY0-501 VCE and PDF