CompTIA SY0-501 Dumps PDF 100% Authentic & Unique Guideline
SAMPLE QUESTIONS:
Question No. 1
A penetration tester harvests potential usernames from a social networking site. The penetration tester then uses social engineering to attempt to obtain associated passwords to gain unauthorized access to shares on a network server. Which of the following methods is the penetration tester MOST likely using?
A. Escalation of privilege
B. SQL injection
C. Active reconnaissance
D. Proxy server
ANSWER : C
Question No. 2
A datacenter recently experienced a breach. When access was gained, an RF device was used to access an air-gapped and locked server rack. Which of the following would BEST prevent this type of attack?
A. Faraday cage
B. Smart cards
C. Infrared detection
D. Alarms
ANSWER : A
Question No. 3
A website administrator has received an alert from an application designed to check the integrity of the company's website. The alert indicated that the hash value for a particular MPEG file has changed. Upon further investigation, the media appears to be the same as it was before the alert. Which of the following methods has MOST likely been used?
A. Cryptography
B. Time of check/time of use
C. Man in the middle
D. Covert timing
E. Steganography
ANSWER : E
Question No. 4
An attacker captures the encrypted communication between two parties for a week, but is unable to decrypt the messages. The attacker then compromises the session key during one exchange and successfully compromises a single message. The attacker plans to use this key to decrypt previously captured and future communications, but is unable to. This is because the encryption scheme in use adheres to:
A. Asymmetric encryption
B. Out-of-band key exchange
C. Perfect forward secrecy
D. Secure key escrow
ANSWER : C
Question No. 5
A systems administrator is attempting to recover from a catastrophic failure in the datacenter. To recover the domain controller, the systems administrator needs to provide the domain administrator credentials. Which of the following account types is the systems administrator using?
A. Shared account
B. Guest account
C. Service account
D. User account
ANSWER : C
FOR MORE INFORMATION
VISIT NOW:
Comments
Post a Comment