Skip survey header

Free CompTIA Security+ Practice Test: SY0-501 Exam 2

Enjoy the following 10 question quiz from TestOut. After the quiz you will get a score and explanations for any missed questions.

1. Which of the following is a valid security measure to protect e-mail from viruses?
2. Which of the following prevents access based on website ratings and classifications?
3. A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database.

Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.

Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection.

Which key steps should you take when implementing this configuration? (Choose two)

4. You are investigating the use of website and URL content filtering to prevent users from visiting certain websites. Which benefits are the result of implementing this technology in your organization? (Choose two)

5. Which of the following are functions of gateway e-mail spam blockers? (Choose two)
6. You have a company network with a single switch. All devices connect to the network through the switch.

You want to control which devices are able to connect to your network. For devices that do not have the latest operating system patches, you want to prevent access to all network devices except for a special server that holds the patches that the computers need to download.

Which of the following components will be part of your solution? (Choose two)
7. Which step is required to configure a NAP on a Remote Desktop (RD) gateway server?
8. In a NAP system, what is the function of the System Health Validator?
9. How does IPsec NAP enforcement differ from other NAP enforcement methods?
10. Your organization's security policy requires you to restrict network access to allow only clients that have their firewall enabled.

Which of the following is a collection of components that would allow you to meet this requirement?