[Free] 2019(Oct) EnsurePass CompTIA SY0-501 Dumps with VCE and PDF 141-150

Get Full Version of the Exam
http://www.EnsurePass.com/SY0-501.html

Question No.141

A system#39;s administrator has finished configuring firewall ACL to allow access to a new web answer.

PERMIT TCP from: ANY to: 192.168.1.10:80 PERMIT TCP from: ANY to: 192.168.1.10:443 DENY TCP from: ANY to: ANY

The security administrator confirms form the following packet capture that there is network traffic from the internet to the web server:

TCP 10.23.243.2:2000-gt;192.168.1.10:80 POST/default#39;s

TCP 172.16.4.100:1934-gt;192.168.1.10:80

GET/session.aspx?user_1_sessionid=a12ad8741d8f7e7ac723847aa8231a

The company#39;s internal auditor issues a security finding and requests that immediate action be

taken. With which of the following is the auditor MOST concerned?

  1. Misconfigured firewall

  2. Clear text credentials

  3. Implicit deny

  4. Default configuration

Correct Answer: B

Question No.142

An in-house penetration tester is using a packet capture device to listen in on network communications. This is an example of:

  1. Passive reconnaissance

  2. Persistence

  3. Escalation of privileges

  4. Exploiting the switch

Correct Answer: D

Question No.143

A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for an FTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor. Which of the following BEST describes the reason why the vulnerability exists?

  1. Default configuration

  2. End-of-life system

  3. Weak cipher suite

  4. Zero-day threats

Correct Answer: B

Question No.144

A security analyst wants to harden the company#39;s VoIP PBX. The analyst is worried that credentials may be intercepted and compromised when IP phones authenticate with the BPX. Which of the following would best prevent this from occurring?

  1. Implement SRTP between the phones and the PBX.

  2. Place the phones and PBX in their own VLAN.

  3. Restrict the phone connections to the PBX.

  4. Require SIPS on connections to the PBX.

Correct Answer: D

Question No.145

A security analyst is testing both Windows and Linux systems for unauthorized DNS zone

transfers within a LAN on comptia.org from example.org. Which of the following commands should the security analyst use? (Select two.)

  1. nslookupcomptia.orgset type=ANYls-d example.org

  2. nslookupcomptia.orgset type=MXexample.org

  3. dig -axfr comptia.org@example.org

  4. ipconfig/flushDNS

  5. ifconfig eth0 downifconfig eth0 updhclient renew

  6. dig@example.org comptia.org

Correct Answer: AC

Question No.146

An application team is performing a load-balancing test for a critical application during off-hours and has requested access to the load balancer to review which servers are up without having the administrator on call. The security analyst is hesitant to give the application team full access due to other critical applications running on the load balancer. Which of the following is the BEST solution for security analyst to process the request?

  1. Give the application team administrator access during off-hours.

  2. Disable other critical applications before granting the team access.

  3. Give the application team read-only access.

  4. None of the above

Correct Answer: C

Question No.147

A company was recently audited by a third party. The audit revealed the company#39;s network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files?

  1. HTTPS

  2. LDAPS

  3. SCP

  4. SNMP3

Correct Answer: C

Question No.148

An auditor is reviewing the following output from a password-cracking tool: User:1: Password1

User2: Recovery! User3: Alaskan10 User4: 4Private User5: PerForMance2

Which of the following methods did the author MOST likely use?

  1. Hybrid

  2. Dictionary

  3. Brute force

  4. Rainbow table

Correct Answer: A

Question No.149

An information security specialist is reviewing the following output from a Linux server.

image

Based on the above information, which of the following types of malware was installed on the server?

  1. Logic bomb

  2. Trojan

  3. Backdoor

  4. Ransomware

  5. Rootkit

Correct Answer: A

Question No.150

Which of the following types of attacks precedes the installation of a rootkit on a server?

  1. Pharming

  2. DDoS

  3. Privilege escalation

  4. DoS

Correct Answer: C

Get Full Version of the Exam
SY0-501 Dumps
SY0-501 VCE and PDF

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.