Month End Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

CompTIA Security+ Exam 2025 Question and Answers

CompTIA Security+ Exam 2025

Last Update Apr 28, 2025
Total Questions : 518

We are offering FREE SY0-701 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare SY0-701 free exam questions and then go for complete pool of CompTIA Security+ Exam 2025 test questions that will help you more.

SY0-701 pdf

SY0-701 PDF

$36.75  $104.99
SY0-701 Engine

SY0-701 Testing Engine

$43.75  $124.99
SY0-701 PDF + Engine

SY0-701 PDF + Testing Engine

$57.75  $164.99
Questions 1

Which of the following is the best way to validate the integrity and availability of a disaster recovery site?

Options:

A.  

Lead a simulated failover.

B.  

Conduct a tabletop exercise.

C.  

Periodically test the generators.

D.  

Develop requirements for database encryption.

Discussion 0
Questions 2

Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?

Options:

A.  

Firewall

B.  

IDS

C.  

Honeypot

D.  

Layer 3 switch

Discussion 0
Questions 3

A security analyst discovers that a large number of employee credentials had been stolen and were being sold on the dark web. The analyst investigates and discovers that some hourly employee credentials were compromised, but salaried employee credentials were not affected.

Most employees clocked in and out while they were Inside the building using one of the kiosks connected to the network. However, some clocked out and recorded their time after leaving to go home. Only those who clocked in and out while Inside the building had credentials stolen. Each of the kiosks are on different floors, and there are multiple routers, since the business segments environments for certain business functions.

Hourly employees are required to use a website called acmetimekeeping.com to clock in and out. This website is accessible from the internet. Which of the following Is the most likely reason for this compromise?

Options:

A.  

A brute-force attack was used against the time-keeping website to scan for common passwords.

B.  

A malicious actor compromised the time-keeping website with malicious code using an unpatched vulnerability on the site, stealing the credentials.

C.  

The internal DNS servers were poisoned and were redirecting acmetimkeeping.com to malicious domain that intercepted the credentials and then passed them through to the real site

D.  

ARP poisoning affected the machines in the building and caused the kiosks lo send a copy of all the submitted credentials to a machine.machine.

Discussion 0
Questions 4

A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?

Options:

A.  

Role-based

B.  

Time-of-day restrictions

C.  

Least privilege

D.  

Biometric authentication

Discussion 0
Questions 5

Which of the following can a security director use to prioritize vulnerability patching within a company's IT environment?

Options:

A.  

SOAR

B.  

CVSS

C.  

SIEM

D.  

CVE

Discussion 0
Questions 6

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Options:

A.  

Secured zones

B.  

Subject role

C.  

Adaptive identity

D.  

Threat scope reduction

Discussion 0
Questions 7

Which of the following allows for the attribution of messages to individuals?

Options:

A.  

Adaptive identity

B.  

Non-repudiation

C.  

Authentication

D.  

Access logs

Discussion 0
Questions 8

An employee fell for a phishing scam, which allowed an attacker to gain access to a company PC. The attacker scraped the PC’s memory to find other credentials. Without cracking these credentials, the attacker used them to move laterally through the corporate network. Which of the following describes this type of attack?

Options:

A.  

Privilege escalation

B.  

Buffer overflow

C.  

SQL injection

D.  

Pass-the-hash

Discussion 0
Questions 9

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

Options:

A.  

Business continuity

B.  

Physical security

C.  

Change management

D.  

Disaster recovery

Discussion 0
Questions 10

An employee who was working remotely lost a mobile device containing company data. Which of the following provides the best solution to prevent future data loss?

Options:

A.  

MDM

B.  

DLP

C.  

FDE

D.  

EDR

Discussion 0
Questions 11

A security team created a document that details the order in which critical systems should be through back online after a major outage. Which of the following documents did the team create?

Options:

A.  

Communication plan

B.  

Incident response plan

C.  

Data retention policy

D.  

Disaster recovery plan

Discussion 0
Questions 12

Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company's internal network?

Options:

A.  

VPN

B.  

LDAP

C.  

FTP

D.  

RADIUS

Discussion 0
Questions 13

Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?

Options:

A.  

Physical

B.  

Managerial

C.  

Technical

D.  

Operational

Discussion 0
Questions 14

In which of the following scenarios is tokenization the best privacy technique 10 use?

Options:

A.  

Providing pseudo-anonymization tor social media user accounts

B.  

Serving as a second factor for authentication requests

C.  

Enabling established customers to safely store credit card Information

D.  

Masking personal information inside databases by segmenting data

Discussion 0
Questions 15

A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?

Options:

A.  

Certification

B.  

Inventory list

C.  

Classification

D.  

Proof of ownership

Discussion 0
Questions 16

After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?

Options:

A.  

Console access

B.  

Routing protocols

C.  

VLANs

D.  

Web-based administration

Discussion 0
Questions 17

An organization wants to improve the company's security authentication method for remote employees. Given the following requirements:

• Must work across SaaS and internal network applications

• Must be device manufacturer agnostic

• Must have offline capabilities

Which of the following would be the most appropriate authentication method?

Options:

A.  

Username and password

B.  

Biometrics

C.  

SMS verification

D.  

Time-based tokens

Discussion 0
Questions 18

The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?

Options:

A.  

SCEP

B.  

CRL

C.  

OCSP

D.  

CSR

Discussion 0
Questions 19

Which of the following would be the best way to test resiliency in the event of a primary power failure?

Options:

A.  

Parallel processing

B.  

Tabletop exercise

C.  

Simulation testing

D.  

Production failover

Discussion 0
Questions 20

Which of the following is a feature of a next-generation SIEM system?

Options:

A.  

Virus signatures

B.  

Automated response actions

C.  

Security agent deployment

D.  

Vulnerability scanning

Discussion 0
Questions 21

Which of the following is die most important security concern when using legacy systems to provide production service?

Options:

A.  

Instability

B.  

Lack of vendor support

C.  

Loss of availability

D.  

Use of insecure protocols

Discussion 0
Questions 22

The internal audit team determines a software application is no longer in scope for external reporting requirements. Which of the following will confirm management’s perspective that the application is no longer applicable?

Options:

A.  

Data inventory and retention

B.  

Right to be forgotten

C.  

Due care and due diligence

D.  

Acknowledgement and attestation

Discussion 0
Questions 23

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?

Options:

A.  

Local data protection regulations

B.  

Risks from hackers residing in other countries

C.  

Impacts to existing contractual obligations

D.  

Time zone differences in log correlation

Discussion 0
Questions 24

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

Options:

A.  

SCAP

B.  

Net Flow

C.  

Antivirus

D.  

DLP

Discussion 0
Questions 25

Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?

Options:

A.  

SLA

B.  

MOU

C.  

MOA

D.  

BPA

Discussion 0
Questions 26

An enterprise security team is researching a new security architecture to better protect the company's networks and applications against the latest cyberthreats. The company has a fully remoteworkforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?

Options:

A.  

IPS

B.  

SIEM

C.  

SASE

D.  

CASB

Discussion 0
Questions 27

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

Options:

A.  

Insider threat

B.  

Hacktivist

C.  

Nation-state

D.  

Organized crime

Discussion 0
Questions 28

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

Options:

A.  

Encryption

B.  

Hashing

C.  

Masking

D.  

Tokenization

Discussion 0
Questions 29

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

Options:

A.  

Packet captures

B.  

Vulnerability scans

C.  

Metadata

D.  

Dashboard

Discussion 0
Questions 30

Which of the following is the first step to secure a newly deployed server?

Options:

A.  

Close unnecessary service ports.

B.  

Update the current version of the software.

C.  

Add the device to the ACL.

D.  

Upgrade the OS version.

Discussion 0
Questions 31

A network manager wants to protect the company's VPN by implementing multifactor authentication that uses:

. Something you know

. Something you have

. Something you are

Which of the following would accomplish the manager's goal?

Options:

A.  

Domain name, PKI, GeolP lookup

B.  

VPN IP address, company ID, facial structure

C.  

Password, authentication token, thumbprint

D.  

Company URL, TLS certificate, home address

Discussion 0
Questions 32

A client demands at least 99.99% uptime from a service provider's hosted security services. Which of the following documents includes the information the service provider should return to the client?

Options:

A.  

MOA

B.  

SOW

C.  

MOU

D.  

SLA

Discussion 0
Questions 33

Which of the following are the best security controls for controlling on-premises access? (Select two.)

Options:

A.  

Swipe card

B.  

Picture ID

C.  

Phone authentication application

D.  

Biometric scanner

E.  

Camera

F.  

Memorable QUESTION NO:

Discussion 0
Questions 34

A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

Options:

A.  

The user jsmith's account has been locked out.

B.  

A keylogger is installed on [smith's workstation

C.  

An attacker is attempting to brute force ismith's account.

D.  

Ransomware has been deployed in the domain.

Discussion 0
Questions 35

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

Options:

A.  

Disaster recovery plan

B.  

Incident response procedure

C.  

Business continuity plan

D.  

Change management procedure

Discussion 0
Questions 36

Which of the following topics would most likely be included within an organization's SDLC?

Options:

A.  

Service-level agreements

B.  

Information security policy

C.  

Penetration testing methodology

D.  

Branch protection requirements

Discussion 0
Questions 37

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

Options:

A.  

Hot site

B.  

Cold site

C.  

Failover site

D.  

Warm site

Discussion 0
Questions 38

An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?

Options:

A.  

Recovery point objective

B.  

Mean time between failures

C.  

Recovery time objective

D.  

Mean time to repair  

Discussion 0
Questions 39

Which of the following is a compensating control for providing user access to a high-risk website?

Options:

A.  

Enabling threat prevention features on the firewall

B.  

Configuring a SIEM tool to capture all web traffic

C.  

Setting firewall rules to allow traffic from any port to that destination

D.  

Blocking that website on the endpoint protection software

Discussion 0
Questions 40

An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?

Options:

A.  

If the wildcard certificate is configured

B.  

If the certificate signing request is valid

C.  

If the root certificate is installed

D.  

If the public key is configured

Discussion 0
Questions 41

An employee used a company's billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?

Options:

A.  

Application logs

B.  

Vulnerability scanner logs

C.  

IDS/IPS logs

D.  

Firewall logs

Discussion 0
Questions 42

A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?

Options:

A.  

Exemption

B.  

Exception

C.  

Avoid

D.  

Transfer

Discussion 0
Questions 43

A database administrator is updating the company's SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?

Options:

A.  

Hashing

B.  

Obfuscation

C.  

Tokenization

D.  

Masking

Discussion 0
Questions 44

A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?

Options:

A.  

Intrusion prevention system

B.  

Sandbox

C.  

Endpoint detection and response

D.  

Antivirus

Discussion 0
Questions 45

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

Options:

A.  

Automation

B.  

Compliance checklist

C.  

Attestation

D.  

Manual audit

Discussion 0
Questions 46

Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?

Options:

A.  

Jailbreaking

B.  

Memory injection

C.  

Resource reuse

D.  

Side loading

Discussion 0
Questions 47

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Which of the following is the most likely way a rogue device was allowed to connect?

Options:

A.  

A user performed a MAC cloning attack with a personal device.

B.  

A DMCP failure caused an incorrect IP address to be distributed

C.  

An administrator bypassed the security controls for testing.

D.  

DNS hijacking let an attacker intercept the captive portal traffic.

Discussion 0
Questions 48

A company's marketing department collects, modifies, and stores sensitive customer data. The infrastructure team is responsible for securing the data while in transit and at rest. Which of the following data roles describes the customer?

Options:

A.  

Processor

B.  

Custodian

C.  

Subject

D.  

Owner

Discussion 0
Questions 49

An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?

Options:

A.  

Enable SAML

B.  

Create OAuth tokens.

C.  

Use password vaulting.

D.  

Select an IdP

Discussion 0
Questions 50

The management team notices that new accounts that are set up manually do not always have correct access or permissions.

Which of the following automation techniques should a systems administrator use to streamline account creation?

Options:

A.  

Guard rail script

B.  

Ticketing workflow

C.  

Escalation script

D.  

User provisioning script

Discussion 0
Questions 51

Which of the following describes the category of data that is most impacted when it is lost?

Options:

A.  

Confidential

B.  

Public

C.  

Private

D.  

Critical

Discussion 0
Questions 52

Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).

Options:

A.  

Channels by which the organization communicates with customers

B.  

The reporting mechanisms for ethics violations

C.  

Threat vectors based on the industry in which the organization operates

D.  

Secure software development training for all personnel

E.  

Cadence and duration of training events

F.  

Retraining requirements for individuals who fail phishing simulations

Discussion 0
Questions 53

An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?

Options:

A.  

NGFW

B.  

WAF

C.  

TLS

D.  

SD-WAN

Discussion 0
Questions 54

A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?

Options:

A.  

Password spraying

B.  

Account forgery

C.  

Pass-t he-hash

D.  

Brute-force

Discussion 0
Questions 55

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?

Options:

A.  

Preparation

B.  

Recovery

C.  

Lessons learned

D.  

Analysis

Discussion 0
Questions 56

A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

Options:

A.  

SPF

B.  

GPO

C.  

NAC

D.  

FIM

Discussion 0
Questions 57

A hacker gained access to a system via a phishing attempt that was a direct result of a user clicking a suspicious link. The link laterally deployed ransomware, which laid dormant for multiple weeks, across the network. Which of the following would have mitigated the spread?

Options:

A.  

IPS

B.  

IDS

C.  

WAF

D.  

UAT

Discussion 0
Questions 58

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

Options:

A.  

Data in use

B.  

Data in transit

C.  

Geographic restrictions

D.  

Data sovereignty

Discussion 0
Questions 59

Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?

Options:

A.  

Client

B.  

Third-party vendor

C.  

Cloud provider

D.  

DBA

Discussion 0
Questions 60

A website user is locked out of an account after clicking an email link and visiting a different website Web server logs show the user's password was changed, even though the user did not change the password. Which of the following is the most likely cause?

Options:

A.  

Cross-sue request forgery

B.  

Directory traversal

C.  

ARP poisoning

D.  

SQL injection

Discussion 0
Questions 61

Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?

Options:

A.  

Development

B.  

Test

C.  

Production

D.  

Staging

Discussion 0
Questions 62

Several customers want an organization to verify its security controls are operating effectively and have requested an independent opinion. Which of the following is the most efficient way to address these requests?

Options:

A.  

Hire a vendor to perform a penetration test.

B.  

Perform an annual self-assessment.

C.  

Allow each client the right to audit.

D.  

Provide a third-party attestation report.

Discussion 0
Questions 63

An organization needs to monitor its users' activities to prevent insider threats. Which of the following solutions would help the organization achieve this goal?

Options:

A.  

Behavioral analytics

B.  

Access control lists

C.  

Identity and access management

D.  

Network intrusion detection system

Discussion 0
Questions 64

Which of the following considerations is the most important for an organization to evaluate as it establishes and maintains a data privacy program?

Options:

A.  

Reporting structure for the data privacy officer

B.  

Request process for data subject access

C.  

Role as controller or processor

D.  

Physical location of the company

Discussion 0
Questions 65

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?

Options:

A.  

A thorough analysis of the supply chain

B.  

A legally enforceable corporate acquisition policy

C.  

A right to audit clause in vendor contracts and SOWs

D.  

An in-depth penetration test of all suppliers and vendors

Discussion 0
Questions 66

Which of the following should a company use to provide proof of external network security testing?

Options:

A.  

Business impact analysis

B.  

Supply chain analysis

C.  

Vulnerability assessment

D.  

Third-party attestation

Discussion 0
Questions 67

Which of the following actors attacking an organization is the most likely to be motivated by personal beliefs?

Options:

A.  

Nation-state

B.  

Organized crime

C.  

Hacktvist

D.  

Insider threat

Discussion 0
Questions 68

Which of the following is required for an organization to properly manage its restore process in the event of system failure?

Options:

A.  

IRP

B.  

DRP

C.  

RPO

D.  

SDLC

Discussion 0
Questions 69

Which of the following threat actors would most likely deface the website of a high-profile music group?

Options:

A.  

Unskilled attacker

B.  

Organized crime

C.  

Nation-state

D.  

Insider threat

Discussion 0
Questions 70

The Chief Information Security Officer wants to discuss options for a disaster recovery site that allows the business to resume operations as quickly as possible. Which of the following solutions meets this requirement?

Options:

A.  

Hot site

B.  

Cold site

C.  

Geographic dispersion

D.  

Warm site

Discussion 0
Questions 71

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

Options:

A.  

Public key infrastructure

B.  

Open public ledger

C.  

Public key encryption

D.  

Key escrow

Discussion 0
Questions 72

Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?

Options:

A.  

SIEM

B.  

WAF

C.  

Network taps

D.  

IDS

Discussion 0
Questions 73

A company's Chief Information Security Officer (CISO) wants to enhance the capabilities of the incident response team. The CISO directs the incident response team to deploy a tool that rapidly analyzes host and network data from potentially compromised systems and forwards the data for further review. Which of the following tools should the incident response team deploy?

Options:

A.  

NAC

B.  

IPS

C.  

SIEM

D.  

EDR

Discussion 0
Questions 74

Which of the following is used to quantitatively measure the criticality of a vulnerability?

Options:

A.  

CVE

B.  

CVSS

C.  

CIA

D.  

CERT

Discussion 0
Questions 75

A security audit of an organization revealed that most of the IT staff members have domain administrator credentials and do not change the passwords regularly. Which of the following solutions should the security learn propose to resolve the findings in the most complete way?

Options:

A.  

Creating group policies to enforce password rotation on domain administrator credentials

B.  

Reviewing the domain administrator group, removing all unnecessary administrators, and rotating all passwords

C.  

Integrating the domain administrator's group with an IdP and requiring SSO with MFA for all access

D.  

Securing domain administrator credentials in a PAM vault and controlling access with role-based access control

Discussion 0
Questions 76

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?

Options:

A.  

Penetration test

B.  

Continuity of operations planning

C.  

Tabletop exercise

D.  

Simulation

Discussion 0
Questions 77

Which of the following should a security operations center use to improve its incident response procedure?

Options:

A.  

Playbooks

B.  

Frameworks

C.  

Baselines

D.  

Benchmarks

Discussion 0
Questions 78

The security operations center is researching an event concerning a suspicious IP address A security analyst looks at the following event logs and discovers that a significant portion of the user accounts have experienced faded log-In attempts when authenticating from the same IP address:

Which of the following most likely describes attack that took place?

Options:

A.  

Spraying

B.  

Brute-force

C.  

Dictionary

D.  

Rainbow table

Discussion 0
Questions 79

A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:

Which of the following best describes the indicator that triggered the alert?

Options:

A.  

Blocked content

B.  

Brute-force attack

C.  

Concurrent session usage

D.  

Account lockout

Discussion 0
Questions 80

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Options:

A.  

Configure all systems to log scheduled tasks.

B.  

Collect and monitor all traffic exiting the network.

C.  

Block traffic based on known malicious signatures.

D.  

Install endpoint management software on all systems.

Discussion 0
Questions 81

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

Options:

A.  

Asset inventory

B.  

Network enumeration

C.  

Data certification

D.  

Procurement process

Discussion 0
Questions 82

Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?

Options:

A.  

SQL injection

B.  

Cross-site scripting

C.  

Zero-day exploit

D.  

On-path attack

Discussion 0
Questions 83

A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering.

Which of the following teams will conduct this assessment activity?

Options:

A.  

White

B.  

Purple

C.  

Blue

D.  

Red

Discussion 0
Questions 84

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

Options:

A.  

Testing input validation on the user input fields

B.  

Performing code signing on company-developed software

C.  

Performing static code analysis on the software

D.  

Ensuring secure cookies are use

Discussion 0
Questions 85

A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?

Options:

A.  

Server multiprocessing

B.  

Warm site

C.  

Load balancer

D.  

Proxy server

Discussion 0
Questions 86

Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?

Options:

A.  

Compliance reporting

B.  

GDPR

C.  

Due diligence

D.  

Attestation

Discussion 0
Questions 87

A university employee logged on to the academic server and attempted to guess the system administrators' log-in credentials. Which of the following security measures should the university have implemented to detect the employee's attempts to gain access to the administrators' accounts?

Options:

A.  

Two-factor authentication

B.  

Firewall

C.  

Intrusion prevention system

D.  

User activity logs

Discussion 0
Questions 88

A security analyst is reviewing logs to identify the destination of command-and-control traffic originating from a compromised device within the on-premises network. Which of the following is the best log to review?

Options:

A.  

IDS

B.  

Antivirus

C.  

Firewall

D.  

Application

Discussion 0
Questions 89

A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers Which of the following solutions is the organization most likely to employ to further increase performance and availability?

Options:

A.  

Load balancer

B.  

Jump server

C.  

Proxy server

D.  

SD-WAN

Discussion 0
Questions 90

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

Options:

A.  

Retain the emails between the security team and affected customers for 30 days.

B.  

Retain any communications related to the security breach until further notice.

C.  

Retain any communications between security members during the breach response.

D.  

Retain all emails from the company to affected customers for an indefinite period of time.

Discussion 0
Questions 91

A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

Options:

A.  

Data retention

B.  

Certification

C.  

Tokenization

D.  

Classification

E.  

Sanitization

F.  

Enumeration

Discussion 0
Questions 92

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

Options:

A.  

Change management ticketing system

B.  

Behavioral analyzer

C.  

Collaboration platform

D.  

Version control tool

Discussion 0
Questions 93

Which of the following definitions best describes the concept of log co-relation?

Options:

A.  

Combining relevant logs from multiple sources into ono location

B.  

Searching end processing, data to identify patterns of malicious activity

C.  

Making a record of the events that occur in the system

D.  

Analyzing the log files of the system components

Discussion 0
Questions 94

A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).

Options:

A.  

SSH

B.  

SNMP

C.  

RDP

D.  

S/MIME

E.  

SMTP

F.  

SFTP

Discussion 0
Questions 95

A company has yearly engagements with a service provider. The general terms and conditions are the same for all engagements. The company wants to simplify the process and revisit the general terms every three years. Which of the following documents would provide the best way to set the general terms?

Options:

A.  

MSA

B.  

NDA

C.  

MOU

D.  

SLA

Discussion 0
Questions 96

A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?

Options:

A.  

Apply IP address reputation data.

B.  

Tap and monitor the email feed.

C.  

Scan email traffic inline.

D.  

Check SPF records.

Discussion 0
Questions 97

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.

SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

Options:

A.  

[Digital forensics

B.  

E-discovery

C.  

Incident response

D.  

Threat hunting

Discussion 0
Questions 98

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

Options:

A.  

ARO

B.  

RTO

C.  

RPO

D.  

ALE

E.  

SLE

Discussion 0
Questions 99

Which of the following activities should a systems administrator perform to quarantine a potentially infected system?

Options:

A.  

Move the device into an air-gapped environment.

B.  

Disable remote log-in through Group Policy.

C.  

Convert the device into a sandbox.

D.  

Remote wipe the device using the MDM platform.

Discussion 0
Questions 100

A security administrator observed the following in a web server log while investigating an incident:

Which of the following attacks did the security administrator most likely see?

Options:

A.  

Privilege escalation

B.  

Credential replay

C.  

Brute force

D.  

Directory traversal

Discussion 0
Questions 101

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

Options:

A.  

Order of volatility

B.  

Preservation of event logs

C.  

Chain of custody

D.  

Compliance with legal hold

Discussion 0
Questions 102

Which of the following allows a systems administrator to tune permissions for a file?

Options:

A.  

Patching

B.  

Access control list

C.  

Configuration enforcement

D.  

Least privilege

Discussion 0
Questions 103

A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

Options:

A.  

Secure cookies

B.  

Version control

C.  

Input validation

D.  

Code signing

Discussion 0
Questions 104

Which of the following is prevented by proper data sanitization?

Options:

A.  

Hackers' ability to obtain data from used hard drives

B.  

Devices reaching end-of-life and losing support

C.  

Disclosure of sensitive data through incorrect classification

D.  

Incorrect inventory data leading to a laptop shortage

Discussion 0
Questions 105

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?

Options:

A.  

Encryption at rest

B.  

Masking

C.  

Data classification

D.  

Permission restrictions

Discussion 0
Questions 106

A customer of a large company receives a phone call from someone claiming to work for the company and asking for the customer's credit card information. The customer sees the caller ID is the same as the company's main phone number. Which of the following attacks is the customer most likely a target of?

Options:

A.  

Phishing

B.  

Whaling

C.  

Smishing

D.  

Vishing

Discussion 0
Questions 107

A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?

Options:

A.  

Serverless architecture

B.  

Thin clients

C.  

Private cloud

D.  

Virtual machines

Discussion 0
Questions 108

Which of the following activities are associated with vulnerability management? (Select two).

Options:

A.  

Reporting

B.  

Prioritization

C.  

Exploiting

D.  

Correlation

E.  

Containment

F.  

Tabletop exercise

Discussion 0
Questions 109

A company recently decided to allow employees to work remotely. The company wants to protect us data without using a VPN. Which of the following technologies should the company Implement?

Options:

A.  

Secure web gateway

B.  

Virtual private cloud end point

C.  

Deep packet Inspection

D.  

Next-gene ration firewall

Discussion 0
Questions 110

An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?

Options:

A.  

XDR

B.  

SPF

C.  

DLP

D.  

DMARC

Discussion 0
Questions 111

Which of the following security measures is required when using a cloud-based platform for loT management?

Options:

A.  

Encrypted connection

B.  

Federated identity

C.  

Firewall

D.  

Single sign-on

Discussion 0
Questions 112

A security analyst is assessing several company firewalls. Which of the following cools would The analyst most likely use to generate custom packets to use during the assessment?

Options:

A.  

hping

B.  

Wireshark

C.  

PowerShell

D.  

netstat

Discussion 0
Questions 113

The Chief Information Security Officer of an organization needs to ensure recovery from ransomware would likely occur within the organization's agreed-upon RPOs end RTOs. Which of the following backup scenarios would best ensure recovery?

Options:

A.  

Hourly differential backups stored on a local SAN array

B.  

Dally full backups stored on premises in magnetic offline media

C.  

Daly differential backups maintained by a third-party cloud provider

D.  

Weekly full backups with daily incremental stored on a NAS drive

Discussion 0
Questions 114

A company's online shopping website became unusable shortly after midnight on January 30, 2023. When a security analyst reviewed the database server, the analyst noticed the following code used for backing up data:

Which of the following should the analyst do next?

Options:

A.  

Check for recently terminated DBAs.

B.  

Review WAF logs for evidence of command injection.

C.  

Scan the database server for malware.

D.  

Search the web server for ransomware notes.

Discussion 0
Questions 115

Which of the following consequences would a retail chain most likely face from customers in the event the retailer is non-compliant with PCI DSS?

Options:

A.  

Contractual impacts

B.  

Sanctions

C.  

Fines

D.  

Reputational damage

Discussion 0
Questions 116

While reviewing logs, a security administrator identifies the following code:

Which of the following best describes the vulnerability being exploited?

Options:

A.  

XSS

B.  

SQLi

C.  

DDoS

D.  

CSRF

Discussion 0
Questions 117

After a security awareness training session, a user called the IT help desk and reported a suspicious call. The suspicious caller stated that the Chief Financial Officer wanted credit card information in order to close an invoice. Which of the following topics did the user recognize from the training?

Options:

A.  

Insider threat

B.  

Email phishing

C.  

Social engineering

D.  

Executive whaling

Discussion 0
Questions 118

A company is currently utilizing usernames and passwords, and it wants to integrate an MFA method that is seamless, can Integrate easily into a user's workflow, and can utilize employee-owned devices. Which of the following will meet these requirements?

Options:

A.  

Push notifications

B.  

Phone call

C.  

Smart card

D.  

Offline backup codes

Discussion 0
Questions 119

Which of the following organizational documents is most often used to establish and communicate expectations associated with integrity and ethical behavior within an organization?

Options:

A.  

AUP

B.  

SLA

C.  

EULA

D.  

MOA

Discussion 0
Questions 120

Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?

Options:

A.  

Data sovereignty

B.  

Geolocation

C.  

Intellectual property

D.  

Geographic restrictions

Discussion 0
Questions 121

Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?

Options:

A.  

Availability

B.  

Confidentiality

C.  

Integrity

D.  

Non-repudiation

Discussion 0
Questions 122

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)

Options:

A.  

Typosquatting

B.  

Phishing

C.  

Impersonation

D.  

Vishing

E.  

Smishing

F.  

Misinformation

Discussion 0
Questions 123

A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?

Options:

A.  

Input sanitization

B.  

Secure cookies

C.  

Static code analysis

D.  

Sandboxing

Discussion 0
Questions 124

A systems administrator is working on a solution with the following requirements:

• Provide a secure zone.

• Enforce a company-wide access control policy.

• Reduce the scope of threats.

Which of the following is the systems administrator setting up?

Options:

A.  

Zero Trust

B.  

AAA

C.  

Non-repudiation

D.  

CIA

Discussion 0
Questions 125

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

Options:

A.  

To reduce implementation cost

B.  

To identify complexity

C.  

To remediate technical debt

D.  

To prevent a single point of failure

Discussion 0
Questions 126

A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?

Options:

A.  

Obtain the file's SHA-256 hash.

B.  

Use hexdump on the file's contents.

C.  

Check endpoint logs.

D.  

Query the file's metadata.

Discussion 0
Questions 127

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

Options:

A.  

Default credentials

B.  

Non-segmented network

C.  

Supply chain vendor

D.  

Vulnerable software

Discussion 0
Questions 128

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

Options:

A.  

Risk mitigation

B.  

Risk identification

C.  

Risk treatment

D.  

Risk monitoring and review

Discussion 0
Questions 129

Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider?

Options:

A.  

Software as a service

B.  

Infrastructure as code

C.  

Internet of Things

D.  

Software-defined networking

Discussion 0
Questions 130

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

Options:

A.  

Implementing a bastion host

B.  

Deploying a perimeter network

C.  

Installing a WAF

D.  

Utilizing single sign-on

Discussion 0
Questions 131

Which of the following allows an exploit to go undetected by the operating system?

Options:

A.  

Firmware vulnerabilities

B.  

Side loading

C.  

Memory injection

D.  

Encrypted payloads

Discussion 0
Questions 132

During a penetration test, a vendor attempts to enter an unauthorized area using an access badge Which of the following types of tests does this represent?

Options:

A.  

Defensive

B.  

Passive

C.  

Offensive

D.  

Physical

Discussion 0
Questions 133

A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?

Options:

A.  

Deploying PowerShell scripts

B.  

Pushing GPO update

C.  

Enabling PAP

D.  

Updating EDR profiles

Discussion 0
Questions 134

Which of the following is the best method to reduce the attack surface of an enterprise network?

Options:

A.  

Disable unused network services on servers.

B.  

Use port security for wired connections.

C.  

Change default passwords for network printers.

D.  

Create a guest wireless network for visitors.

Discussion 0
Questions 135

Which of the following architectures is most suitable to provide redundancy for critical business processes?

Options:

A.  

Network-enabled

B.  

Server-side

C.  

Cloud-native

D.  

Multitenant

Discussion 0
Questions 136

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:

“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”

Which of the following are the best responses to this situation? (Choose two).

Options:

A.  

Cancel current employee recognition gift cards.

B.  

Add a smishing exercise to the annual company training.

C.  

Issue a general email warning to the company.

D.  

Have the CEO change phone numbers.

E.  

Conduct a forensic investigation on the CEO's phone.

F.  

Implement mobile device management.

Discussion 0
Questions 137

While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable.

Which of the following actions would prevent this issue?

Options:

A.  

Documenting the new policy in a change request and submitting the request to change management

B.  

Testing the policy in a non-production environment before enabling the policy in the production network

C.  

Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy

D.  

Including an 'allow any1 policy above the 'deny any* policy

Discussion 0
Questions 138

The local administrator account for a company's VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening'?

Options:

A.  

Using least privilege

B.  

Changing the default password

C.  

Assigning individual user IDs

D.  

Reviewing logs more frequently

Discussion 0
Questions 139

A company wants to ensure secure remote access to its internal network. The company has only one public IP and would like to avoid making any changes to the current network setup. Which of the following solutions would best accomplish this goal?

Options:

A.  

PAT

B.  

IPSec VPN

C.  

Perimeter network

D.  

Reverse proxy

Discussion 0
Questions 140

A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:

• An existing Internal certificate must be used.

• Wired and wireless networks must be supported

• Any unapproved device should be Isolated in a quarantine subnet

• Approved devices should be updated before accessing resources

Which of the following would best meet the requirements?

Options:

A.  

802.IX

B.  

EAP

C.  

RADIUS

D.  

WPA2

Discussion 0
Questions 141

After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?

Options:

A.  

Compensating

B.  

Detective

C.  

Preventive

D.  

Corrective

Discussion 0
Questions 142

During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability?

Options:

A.  

Race condition

B.  

Memory injection

C.  

Malicious update

D.  

Side loading

Discussion 0
Questions 143

Which of the following documents details how to accomplish a technical security task?

Options:

A.  

Standard

B.  

Policy

C.  

Guideline

D.  

Procedure

Discussion 0
Questions 144

An organization has a new regulatory requirement to implement corrective controls on a financial system. Which of the following is the most likely reason for the new requirement?

Options:

A.  

To defend against insider threats altering banking details

B.  

To ensure that errors are not passed to other systems

C.  

To allow for business insurance to be purchased

D.  

To prevent unauthorized changes to financial data

Discussion 0