ATTENTION PLEASE!!! The SY0-401 Exam Will Retire On July 31, 2018, and then the New Exam is SY0-501! The new SY0-501 dumps (Dec/2017 Updated) now are available, here are part of SY0-501 exam questions (FYI): [Get the download link at the end of this post] NEW QUESTION 141 A company wants to ensure that the validity of publicly trusted certificates used by its web server can be determined even during an extended internet outage. Which of the following should be implemented? A. Recovery agent B. Ocsp C. Crl D. Key escrow Answer: B NEW QUESTION 142 An administrator intends to configure an IPSec solution that provides ESP with integrity protection, but not confidentiality protection. Which of the following AES modes of operation would meet this integrity-only requirement? A. HMAC B. PCBC C. CBC D. GCM E. CFB Answer: A NEW QUESTION 143 The Chief Security Officer (CSO) has issued a new policy that requires that all internal websites be configured for HTTPS traffic only. The network administrator has been tasked to update all internal sites without incurring additional costs. Which of the following is the best solution for the network administrator to secure each internal website? A. Use certificates signed by the company CA. B. Use a signing certificate as a wild card certificate. C. Use certificates signed by a public CA. D. Use a self-signed certificate on each internal server. Answer: D NEW QUESTION 144 A security program manager wants to actively test the security posture of a system. The system is not yet in production and has no uptime requirement or active user base. Which of the following methods will produce a report which shows vulnerabilities that were actually exploited? A. Peer review B. Component testing C. Penetration testing D. Vulnerability testing Answer: C Explanation: A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. NEW QUESTION 145 A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called "purchasing", however, the purchasing group permissions allow write access. Which of the following would be the BEST course of action? A. Modify all the shared files with read only permissions for the intern. B. Create a new group that has only read permissions for the files. C. Remove all permissions for the shared files. D. Add the intern to the "purchasing" group. Answer: B NEW QUESTION 146 A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected. To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of having the laptops compromised? A. MAC filtering B. Virtualization C. OS hardening D. Application white-listing Answer: C NEW QUESTION 147 A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format? A. PFX B. PEM C. DER D. CER Answer: B NEW QUESTION 148 When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select TWO.) A. USB-attached hard disk B. Swap/pagefile C. Mounted network storage D. ROM E. RAM Answer: AD NEW QUESTION 149 When configuring settings in a mandatory access control environment, which of the following specifies the subjects that can access specific data objects? A. Owner B. System C. Administrator D. User Answer: C NEW QUESTION 150 ...... NEW QUESTION 151 A user clicked an email link that led to a website that infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not detected or blocked by the company's email filter, website filter, or antivirus. Which of the following describes what occurred? A. The user's account was over-privileged. B. Improper error handling triggered a false negative in all three controls. C. The email originated from a private email server with no malware protection. D. The virus was a zero-day attack. Answer: A NEW QUESTION 152 Which of the fallowing security controls does an iris scanner provide? A. Logical B. Administrative C. Corrective D. Physical E. Detective F. Deterrent Answer: D NEW QUESTION 153 ...... Get the newest PassLeader SY0-501 VCE dumps here: Dear visitor, you need to Register or Login to view links on Certify Chat. (Wrong Answers Have Been Corrected on 28/Dec/2017!!!) OR Download more NEW PassLeader SY0-501 PDF dumps from Google Drive here: Dear visitor, you need to Register or Login to view links on Certify Chat. OR Read the newest PassLeader SY0-501 exam questions from this Blog: Dear visitor, you need to Register or Login to view links on Certify Chat. Good Luck!!!