Valid SY0-501 Dumps shared by ExamDiscuss.com for Helping Passing SY0-501 Exam! ExamDiscuss.com now offer the newest SY0-501 exam dumps, the ExamDiscuss.com SY0-501 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com SY0-501 dumps with Test Engine here:

Access SY0-501 Dumps Premium Version
(715 Q&As Dumps, 35%OFF Special Discount Code: freecram)

<< Prev Question Next Question >>

Question 16/100

A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring?

Recent Comments (The most recent comments are at the top.)

Sam - Nov 12, 2018

Not correct. Off boarding is the answer. Campus can be closed on the weekends or even at night at 2am. It does not say before the first day of the semester. Is says while the campus is closed. Account expiration makes no since, if he was offboarded correctly then his account would have been disabled. GAGC has the exact question and it is B 100% sure.

Mat - Nov 04, 2018

Offboarding isnt going to fix it because he did it before resigning. Time of day restrictions won&#39;t fix it because he shouldn&#39;t have had access to delete the shares in the first place so he could still do it within that time of day restriction and account experation isnt going to matter because it was done before he quit. The issue here is the delete access he has to shares that he should not have. You could have caught the issue and prevented it with a permission audit and review

SAM - Jul 14, 2018

I concur with C. Time of day. Had they restricted logins during the holiday, this would have been prevented.
Although permission auditing and review could have prevented him from deleting files and folders outside of his home directory, the scenario doesn&#39;t specify if he deleted his own files or someoneelse&#39;s. If it were his own, then a permission audit would not have prevented this.
It can&#39;t be offboarding because he did it before resigning.
Account expiry? Good one too, but unlikely since he was still employed.

Kemula Franklin - Jun 27, 2018

The answer is C

Smart  - Jun 05, 2018

This is b.s

Its D

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (100q)
1 commentQuestion 1: A company has three divisions, each with its own networks an...
Question 2: Refer to the following code: (Exhibit) Which of the followin...
Question 3: Joe, a user, wants to send Ann, another user, a confidential...
Question 4: A network administrator wants to implement a method of secur...
Question 5: A user suspects someone has been accessing a home network wi...
Question 6: After an identified security breach, an analyst is tasked to...
Question 7: A development team has adopted a new approach to projects in...
Question 8: An organization's file server has been virtualized to reduce...
Question 9: A company's loss control department identifies theft as a re...
Question 10: Which of the following would meet the requirements for multi...
3 commentQuestion 11: A security analyst reviews the following output: (Exhibit) T...
3 commentQuestion 12: A company is terminating an employee for misbehavior. Which ...
Question 13: A user has attempted to access data at a higher classificati...
Question 14: An organization is comparing and contrasting migration from ...
Question 15: A security analyst is performing a quantitative risk analysi...
5 commentQuestion 16: A department head at a university resigned on the first day ...
2 commentQuestion 17: When identifying a company's most valuable assets as part of...
3 commentQuestion 18: A penetration tester is crawling a target website that is av...
Question 19: Which of the following cryptography algorithms will produce ...
Question 20: Which of the following BEST describes an important security ...
Question 21: An incident responder receives a call from a user who report...
Question 22: Which of the following cryptographic algorithms is irreversi...
Question 23: A company is using a mobile device deployment model in which...
Question 24: When configuring settings in a mandatory access control envi...
Question 25: Which of the following explains why vendors publish MD5 valu...
Question 26: Which of the following are methods to implement HA in a web ...
Question 27: When systems, hardware, or software are not supported by the...
Question 28: A systems administrator is reviewing the following informati...
2 commentQuestion 29: An in-house penetration tester is using a packet capture dev...
Question 30: A manager wants to distribute a report to several other mana...
Question 31: Ann. An employee in the payroll department, has contacted th...
Question 32: An organization is using a tool to perform a source code rev...
Question 33: Which of the following occurs when the security of a web app...
Question 34: A security consultant discovers that an organization is usin...
Question 35: Which of the following BEST describes a network-based attack...
Question 36: An analyst wants to implement a more secure wireless authent...
Question 37: Which of the following can be provided to an AAA system for ...
Question 38: As part of the SDLC, a third party is hired to perform a pen...
Question 39: DRAG DROP You have been tasked with designing a security pla...
Question 40: A user is presented with the following items during the new-...
Question 41: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 42: In a corporation where compute utilization spikes several ti...
Question 43: CORRECT TEXT You have just received some room and WiFi acces...
Question 44: A vulnerability scanner that uses its running service's acce...
Question 45: A security administrator is developing controls for creating...
Question 46: Which of the following are the MAIN reasons why a systems ad...
Question 47: A high-security defense installation recently begun utilizin...
Question 48: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 49: A Chief Information Officer (CIO) drafts an agreement betwee...
Question 50: A company hires a third-party firm to conduct an assessment ...
Question 51: A security administrator receives an alert from a third-part...
Question 52: A security analyst receives a notification from the IDS afte...
Question 53: A company hired a third-party firm to conduct as assessment ...
Question 54: As part of a new industry regulation, companies are required...
Question 55: A system administrator is reviewing the following informatio...
Question 56: A security analyst is diagnosing an incident in which a syst...
Question 57: A company was recently audited by a third party. The audit r...
Question 58: Which of the following types of keys is found in a key escro...
1 commentQuestion 59: Which of the following network vulnerability scan indicators...
Question 60: A security analyst is hardening a server with the directory ...
Question 61: A security engineer is configuring a system that requires th...
Question 62: Which of the following precautions MINIMIZES the risk from n...
Question 63: A security analyst is reviewing the following output from an...
Question 64: DRAG DROP Drag and drop the correct protocol to its default ...
Question 65: A security analyst is hardening a web server, which should a...
Question 66: DRAG DROP A security administrator wants to implement strong...
Question 67: An application developer is designing an application involvi...
Question 68: Which of the following is an important step to take BEFORE m...
Question 69: A security analyst is hardening an authentication server. On...
Question 70: An administrator is replacing a wireless router. The configu...
Question 71: An organization's internal auditor discovers that large sums...
2 commentQuestion 72: A wireless network uses a RADIUS server that is connected to...
Question 73: A company has a data system with definitions for "Private" a...
Question 74: A technician suspects that a system has been compromised. Th...
Question 75: A director of IR is reviewing a report regarding several rec...
Question 76: DRAG DROP A Security administrator wants to implement strong...
Question 77: A security analyst receives an alert from a WAF with the fol...
Question 78: An analyst is reviewing a simple program for potential secur...
Question 79: An application team is performing a load-balancing test for ...
Question 80: Which of the following must be intact for evidence to be adm...
Question 81: A datacenter recently experienced a breach. When access was ...
Question 82: A network technician is setting up a segmented network that ...
Question 83: A botnet has hit a popular website with a massive number of ...
1 commentQuestion 84: A system administrator wants to provide balance between the ...
Question 85: Which of the following vulnerability types would the type of...
Question 86: A manager suspects that an IT employee with elevated databas...
Question 87: A company's user lockout policy is enabled after five unsucc...
Question 88: When performing data acquisition on a workstation, which of ...
Question 89: To reduce disk consumption, an organization's legal departme...
Question 90: A security administrator has found a hash in the environment...
Question 91: Malicious traffic from an internal network has been detected...
Question 92: Before an infection was detected, several of the infected de...
1 commentQuestion 93: A security engineer is configuring a wireless network that m...
Question 94: Which of the following attack types BEST describes a client-...
3 commentQuestion 95: A database backup schedule consists of weekly full backups p...
1 commentQuestion 96: Which of the following would MOST likely appear in an uncred...
Question 97: When connected to a secure WAP, which of the following encry...
Question 98: A network administrator at a small office wants to simplify ...
Question 99: A company wants to host a publicity available server that pe...
1 commentQuestion 100: HOTSPOT Select the appropriate attack from each drop down li...