New CompTIA SY0-501 Q&A  


New Member
Joined:2 months  ago
Posts: 2
31/07/2018 11:06 am  

1. Which of the following is an asymmetric function that generates a new and separate key every time it runs?


Correct Answer: C

2. Which of the following access management concepts is associated with the file permissions?

A. Authentication
B. Accounting
C. Authorization
D. Identification

Correct Answer: C

3. While working with a small, local farm to improve its security practices, a security consultant notices attempted logons to the farm’s email server from a foreign country. The consultant can help block these attempts by implementing:

A. firewall ACLs.
B. port security.
C. an IDS.
D. A reverse proxy.

Correct Answer: D

4. An organization’s Chief Information Officer (CIO) recently received an email from human resources that contained sensitive information. The CIO noticed the email was sent via unsecure means. A policy has since been put into place stating all emails must be transmitted using secure technologies. Which of the following should be implemented to address the new policy?


Correct Answer: C

5. A technician wants to perform network enumeration against a subnet in preparation for an upcoming assessment. During the first phase, the technician performs a ping sweep. Which of the following scan types did the technicians use?

A. Non-intrusive
B. Intrusive
C. Credentialed
D. Passive

Correct Answer: C

6. A security analyst is checking the bash command history on a Linux host that was involved in a data breach. The data breach stemmed from the Linux host running a senses of commands against a web server on the internal network, which exploited a vulnerability in an unpatched, outdated Apache module. Given this scenario, which of the following commands might the analyst find in the bash command history for banner grabbing? (Select TWO).

A. Arp
B. tracert
C. nmap
D. telnet
E. nslookup
F. grep

Correct Answer: C & D

7. A security analyst finished drafting an official response to a security assessment report, which must be sent to the head of the auditing department. The security analyst needs to assure the head of the auditing department that the response came from the security analyst, and the contents of the response must be kept confidential. Which of the following are the LAST steps the security analyst should perform prior to electronically sending the message? (Select TWO).

A. Hash the message.
B. Encrypt the message.
C. Digitally sign the message.
D. Label the email as “Confidential.”
E. Perform key exchange with the recipient.

Correct Answer: B & C

8. Which of the following would be MOST effective in reducing tailgating incidents?

A. Mantrap
B. Faraday cage
C. Motion detection
D. Bollards

Correct Answer: A

9. A retail store recently deployed tablets for sales employees to use while assisting customers. Two of the tablets have already been lost or stolen. Which of the following would be the BEST way for the store to secure the tablets against future loss or theft?

A. Cable locks
B. Screen filters
C. Geocaching
D. Remote wipe

Correct Answer: A

10. Which of the following security controls provides an alternative solution to a control that would be considered unpractical or excessively expensive?

A. Deterrent
B. Compensating
C. Technical
D. Administrative

Correct Answer: D

Until next time, I will post a new lab 


Kid Prodigy


PrepAway - Latest Free Exam Questions & Answers

Please Login or Register