[Free] EnsurePass CompTIA SY0-501 Real Exam Dumps Questions 31-40

Get Full Version of the Exam

Question No.31

A user has attempted to access data at a higher classification level than the user#39;s account is currently authorized to access. Which of the following access control models has been applied to this user#39;s account?

  1. MAC

  2. DAC

  3. RBAC

  4. ABAC

Correct Answer: A

Question No.32

Multiple organizations operating in the same vertical wants to provide seamless wireless access for their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1x client on their mobile devices?

  1. Shibboleth

  2. RADIUS federation

  3. SAML

  4. OAuth

  5. OpenID connect

Correct Answer: B

Question No.33

A user suspects someone has been accessing a home network without permission by spoofing the MAC address of an authorized system. While attempting to determine if an authorized user is logged into the home network, the user reviews the wireless router, which shows the following table for systems that are currently on the home network.


Which of the following should be the NEXT step to determine if there is an unauthorized user on the network?

  1. Apply MAC filtering and see if the router drops any of the systems.

  2. Physically check each of the authorized systems to determine if they are logged onto the network.

  3. Deny the quot;unknownquot; host because the hostname is not known and MAC filtering is not applied to this host.

  4. Conduct a ping sweep of each of the authorized systems and see if an echo response is received.

Correct Answer: C

Question No.34

A company is using a mobile device deployment model in which employees use their personal devices for work at their own discretion. Some of the problems the company is encountering include the following:


There is no standardization.


Employees ask for reimbursement for their devices.



Employees do not replace their devices often enough to keep them running efficiently. The company does not have enough control over the devices.

Which of the following is a deployment model that would help the company overcome these problems?

  1. BYOD

  2. VDI

  3. COPE

  4. CYOD

Correct Answer: D

Question No.35

A security analyst is diagnosing an incident in which a system was compromised from an external IP address. The socket identified on the firewall was traced to Which of the following should the security analyst do to determine if the compromised system still has an active connection?

  1. tracert

  2. netstat

  3. ping

  4. nslookup

Correct Answer: B

Question No.36

A senior incident response manager receives a call about some external IPs communicating with internal computers during off hours. Which of the following types of malware is MOST likely causing this issue?

  1. Botnet

  2. Ransomware

  3. Polymorphic malware

  4. Armored virus

Correct Answer: A

Question No.37

A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on

Tuesday afternoon, which of the following is the number of individual backups that would need to be applied to complete the database recovery?









Correct Answer: B

Question No.38

A company wants to host a publicly available server that performs the following functions:


Evaluates MX record lookup



Can perform authenticated requests for A and AAA records Uses RRSIG

Which of the following should the company use to fulfill the above requirements?

  1. LDAPS


  3. SFTP

  4. nslookup

  5. dig

Correct Answer: B

Question No.39

An organization wishes to provide better security for its name resolution services. Which of the following technologies BEST supports the deployment of DNSSEC at the organization?

  1. LDAP

  2. TPM

  3. TLS

  4. SSL

  5. PKI

Correct Answer: E

Question No.40

Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)

  1. Password expiration

  2. Password length

  3. Password complexity

  4. Password history

  5. Password lockout

Correct Answer: CD

Get Full Version of the Exam
SY0-501 Dumps
SY0-501 VCE and PDF