Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CompTIA SY0-101 Exam -

Free SY0-101 Sample Questions:

1. Following a disaster, while returning to the original site from an alternate site, the first process to resume at the original site would be the:
A. least critical process
B. most critical process
C. process most expensive to maintain at an alternate site
D. process that has maximum visibility in the organization
Answer: A

2. Documenting change levels and revision information is most useful for:
A. theft tracking
B. security audits
C. disaster recovery
D. license enforcement
Answer: C

3. A recent audit shows that a user logged into a server with their user account and executed a program. The user then performed activities only available to an administrator. This is an example of what type of an attack?
A. Trojan horse
B. privilege escalation
C. subseven back door
D. security policy removal
Answer: B

4. Notable security organizations often recommend only essential services be provided by a particular host, and any unnecessary services be disabled. Which of the following does NOT represent a reason supporting this recommendation?
A. Each additional service increases the risk of compromising the host, the services that run on the host, and potential clients of these services.
B. Different services may require different hardware, software, or a different discipline of administration.
C. When fewer services and applications are running on a specific host, fewer log entries and fewer interactions between different services are expected, which simplifies the analysis and maintenance of the system from a security point of view.
D. If a service is not using a well known port, firewalls will not be able to disable access to this port, and an administrator will not be able to restrict access to this service.
Answer: D

5. Which of the following is a technical solution that supports high availability?
A. UDP (User Datagram Protocol)
B. anti-virus solution
C. RAID (Redundant Array of Independent Disks)
D. firewall
Answer: C

6. In order for a user to obtain a certificate from a trusted CA (Certificate Authority), the user must present proof of identity and a:
A. private key
B. public key
C. password
D. Kerberos key
Answer: B

7. In the context of wireless networks, WEP (Wired Equivalent Privacy) was designed to:
A. provide the same level of security as a wired LAN (Local Area Network)
B. provide a collision preventive method of media access
C. provide a wider access area than that of wired LANs (Local Area Network)
D. allow radio frequencies to penetrate walls
Answer: A

8. A primary drawback to using shared storage clustering for high availability and disaster recovery is:
A. the creation of a single point of vulnerability
B. the increased network latency between the host computers and the RAID (Redundant Array of Independent Disks) subsystem
C. the asynchronous writes which must be used to flush the server cache
D. the higher storage capacity required by the RAID (Redundant Array of Independent Disks) subsystem
Answer: A

9. What are access decisions based on in a MAC (Mandatory Access Control) environment?
A. access control lists
B. ownership
C. group membership
D. sensitivity labels
Answer: D

10. Packet sniffing can be used to obtain username and password information in clear text from which one of the following?
A. SSH (Secure Shell)
B. SSL (Secure Sockets Layer)
C. FTP (File Transfer Protocol)
D. HTTPS (Hypertext Transfer Protocol over Secure Sockets Layer)
Answer: C

11. When securing a FTP (File Transfer Protocol) server, what can be done to ensure that only authorized users can access the server?
A. allow blind authentication
B. disable anonymous authentication
C. redirect FTP (File Transfer Protocol) to another port
D. only give the address to users that need access
Answer: B

12. Asymmetric cryptography ensures that:
A. encryption and authentication can take place without sharing private keys
B. encryption of the secret key is performed with the fastest algorithm available
C. encryption occurs only when both parties have been authenticated
D. encryption factoring is limited to the session key
Answer: A

13. Which of the following media types is most immune to RF (Radio Frequency) eavesdropping?
A. coaxial cable
B. fiber optic cable
C. twisted pair wire
D. unbounded
Answer: B

14. Access controls that are created and administered by the data owner are considered:
A. MACs (Mandatory Access Control)
B. RBACs (Role Based Access Control)
C. LBACs (List Based Access Control)
D. DACs (Discretionary Access Control)
Answer: D

15. An administrator notices that an e-mail server is currently relaying e-mail (including spam) for any e-mail server requesting relaying. Upon further investigation the administrator notices the existence of /etc/mail/relay domains. What modifications should the administrator make to the relay domains file to prevent relaying for non-explicitly named domains?
A. move the .* entry to the bottom of the relay domains file and restart the e-mail process
B. move the .* entry to the top of the relay domains file and restart the e-mail process
C. delete the .* entry in the relay domains file and restart the e-mail process
D. delete the relay domains file from the /etc/mail folder and restart the e-mail process
Answer: C

16. Providing false information about the source of an attack is known as:
A. aliasing
B. spoofing
C. flooding
D. redirecting
Answer: B

17. The term “due care” best relates to:
A. policies and procedures intended to reduce the likelihood of damage or injury
B. scheduled activity in a comprehensive preventative maintenance program
C. techniques and methods for secure shipment of equipment and supplies
D. user responsibilities involved when sharing passwords in a secure environment
Answer: A

18. A high profile company has been receiving a high volume of attacks on their public web site. The network administrator wants to be able to collect information on the attacker(s) so legal action can be taken. What should be implemented?
A. a DMZ (Demilitarized Zone)
B. a honey pot
C. a firewall
D. a new subnet
Answer: B

19. Many intrusion detection systems look for known patterns or ______ to aid in detecting attacks.
A. viruses
B. signatures
C. hackers
D. malware
Answer: B

20. After installing a new operating system, what configuration changes should be implemented?
A. create application user accounts
B. rename the guest account
C. rename the administrator account, disable the guest accounts
D. create a secure administrator account
Answer: C

21. In order to establish a secure connection between headquarters and a branch office over a public network, the router at each location should be configured to use IPSec (Internet Protocol Security) in _____ mode.
A. secure
B. tunnel
C. transport
D. data link
Answer: B

22. What type of authentication may be needed when a stored key and a memorized password are not strong enough and additional layers of security are needed?
A. mutual
B. multi-factor
C. biometric
D. certificate
Answer: B

23. What technology was originally designed to decrease broadcast traffic but is also beneficial in reducing the likelihood of having information compromised by sniffers?
A. VPN (Virtual Private Network)
B. DMZ (Demilitarized Zone)
C. VLAN (Virtual Local Area Network)
D. RADIUS (Remote Authentication Dial-in User Service)
Answer: C

24. A DMZ (Demilitarized Zone) typically contains:
A. a customer account database
B. staff workstations
C. a FTP (File Transfer Protocol) server
D. a SQL (Structured Query Language) based database server
Answer: C

25. What kind of attack are hashed passwords vulnerable to?
A. man in the middle
B. dictionary or brute force
C. reverse engineering
D. DoS (Denial of Service)
Answer: B

26. Controlling access to information systems and associated networks is necessary for the preservation of their:
A. authenticity, confidentiality, integrity and availability
B. integrity and availability
C. confidentiality, integrity and availability
D. authenticity, confidentiality and availability
Answer: C

27. A collection of information that includes login, file access, other various activities, and actual or attempted legitimate and unauthorized security violations is a(n):
A. audit
B. ACL (Access Control List)
C. audit trail
D. syslog
Answer: C

28. What transport protocol and port number does SSH (Secure Shell) use?
A. TCP (Transmission Control Protocol) port 22
B. UDP (User Datagram Protocol) port 69
C. TCP (Transmission Control Protocol) port 179
D. UDP (User Datagram Protocol) port 17
Answer: A

29. What statement is most true about viruses and hoaxes?
A. Hoaxes can create as much damage as a real virus.
B. Hoaxes are harmless pranks and should be ignored.
C. Hoaxes can help educate users about a virus.
D. Hoaxes carry a malicious payload and can be destructive.
Answer: A

30. What is the greatest benefit to be gained through the use of S/MIME (Secure Multipurpose Internet Mail Extensions)? The ability to:
A. encrypt and digitally sign e-mail messages
B. send anonymous e-mails
C. send e-mails with a return receipt
D. expedite the delivery of e-mail
Answer: A

© 2014, All Rights Reserved