Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CompTIA Security+ Exam Question and Answers

CompTIA Security+ Exam

Last Update Apr 28, 2024
Total Questions : 171

We are offering FREE SY0-701 CompTIA exam questions. All you do is to just go and sign up. Give your details, prepare SY0-701 free exam questions and then go for complete pool of CompTIA Security+ Exam test questions that will help you more.

SY0-701 pdf

SY0-701 PDF

$35  $99.99
SY0-701 Engine

SY0-701 Testing Engine

$42  $119.99
SY0-701 PDF + Engine

SY0-701 PDF + Testing Engine

$56  $159.99
Questions 1

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

Options:

A.  

The device has been moved from a production environment to a test environment.

B.  

The device is configured to use cleartext passwords.

C.  

The device is moved to an isolated segment on the enterprise network.

D.  

The device is moved to a different location in the enterprise.

E.  

The device's encryption level cannot meet organizational standards.

F.  

The device is unable to receive authorized updates.

Discussion 0
Questions 2

Which of the following can best protect against an employee inadvertently installing malware on a company system?

Options:

A.  

Host-based firewall

B.  

System isolation

C.  

Least privilege

D.  

Application allow list

Discussion 0
Questions 3

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.

INSTRUCTIONS

Not all attacks and remediation actions will be used.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Discussion 0
Questions 4

A business received a small grant to migrate its infrastructure to an off-premises solution. Which of the following should be considered first?

Options:

A.  

Security of cloud providers

B.  

Cost of implementation

C.  

Ability of engineers

D.  

Security of architecture

Discussion 0
Questions 5

A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

Options:

A.  

Off-the-shelf software

B.  

Orchestration

C.  

Baseline

D.  

Policy enforcement

Discussion 0
Questions 6

A systems administrator receives the following alert from a file integrity monitoring tool:

The hash of the cmd.exe file has changed.

The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?

Options:

A.  

The end user changed the file permissions.

B.  

A cryptographic collision was detected.

C.  

A snapshot of the file system was taken.

D.  

A rootkit was deployed.

Discussion 0
Questions 7

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?

Options:

A.  

Corrective

B.  

Preventive

C.  

Detective

D.  

Deterrent

Discussion 0
Questions 8

Which of the following would be the best way to block unknown programs from executing?

Options:

A.  

Access control list

B.  

Application allow list.

C.  

Host-based firewall

D.  

DLP solution

Discussion 0
Questions 9

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

Options:

A.  

Compromise

B.  

Retention

C.  

Analysis

D.  

Transfer

E.  

Inventory

Discussion 0
Questions 10

Which of the following enables the use of an input field to run commands that can view or manipulate data?

Options:

A.  

Cross-site scripting

B.  

Side loading

C.  

Buffer overflow

D.  

SQL injection

Discussion 0
Questions 11

Which of the following describes the process of concealing code or text inside a graphical image?

Options:

A.  

Symmetric encryption

B.  

Hashing

C.  

Data masking

D.  

Steganography

Discussion 0
Questions 12

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

Options:

A.  

Changing the remote desktop port to a non-standard number

B.  

Setting up a VPN and placing the jump server inside the firewall

C.  

Using a proxy for web connections from the remote desktop server

D.  

Connecting the remote server to the domain and increasing the password length

Discussion 0
Questions 13

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Options:

A.  

Configure all systems to log scheduled tasks.

B.  

Collect and monitor all traffic exiting the network.

C.  

Block traffic based on known malicious signatures.

D.  

Install endpoint management software on all systems.

Discussion 0
Questions 14

A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?

Options:

A.  

encryption=off\

B.  

http://

C.  

www.*.com

D.  

:443

Discussion 0
Questions 15

An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?

Options:

A.  

ACL

B.  

DLP

C.  

IDS

D.  

IPS

Discussion 0
Questions 16

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

Options:

A.  

Air gap the system.

B.  

Move the system to a different network segment.

C.  

Create a change control request.

D.  

Apply the patch to the system.

Discussion 0
Questions 17

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?

Options:

A.  

Real-time recovery

B.  

Hot

C.  

Cold

D.  

Warm

Discussion 0
Questions 18

An organization would like to store customer data on a separate part of the network that is not accessible to users on the main corporate network. Which of the following should the administrator use to accomplish this goal?

Options:

A.  

Segmentation

B.  

Isolation

C.  

Patching

D.  

Encryption

Discussion 0
Questions 19

A Chief Information Security Officer wants to monitor the company's servers for SQLi attacks and allow for comprehensive investigations if an attack occurs. The company uses SSL decryption to allow traffic monitoring. Which of the following strategies would best accomplish this goal?

Options:

A.  

Logging all NetFlow traffic into a SIEM

B.  

Deploying network traffic sensors on the same subnet as the servers

C.  

Logging endpoint and OS-specific security logs

D.  

Enabling full packet capture for traffic entering and exiting the servers

Discussion 0
Questions 20

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

Options:

A.  

Compensating control

B.  

Network segmentation

C.  

Transfer of risk

D.  

SNMP traps

Discussion 0
Questions 21

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

Options:

A.  

Accept

B.  

Transfer

C.  

Mitigate

D.  

Avoid

Discussion 0
Questions 22

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?

Options:

A.  

RDP server

B.  

Jump server

C.  

Proxy server

D.  

Hypervisor

Discussion 0
Questions 23

Which of the following is a primary security concern for a company setting up a BYOD program?

Options:

A.  

End of life

B.  

Buffer overflow

C.  

VM escape

D.  

Jailbreaking

Discussion 0
Questions 24

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?

Options:

A.  

Local data protection regulations

B.  

Risks from hackers residing in other countries

C.  

Impacts to existing contractual obligations

D.  

Time zone differences in log correlation

Discussion 0
Questions 25

A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?

Options:

A.  

Conduct an audit.

B.  

Initiate a penetration test.

C.  

Rescan the network.

D.  

Submit a report.

Discussion 0
Questions 26

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

Options:

A.  

Capacity planning

B.  

Redundancy

C.  

Geographic dispersion

D.  

Tablet exercise

Discussion 0
Questions 27

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

Options:

A.  

Packet captures

B.  

Vulnerability scans

C.  

Metadata

D.  

Dashboard

Discussion 0
Questions 28

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)

Options:

A.  

Typosquatting

B.  

Phishing

C.  

Impersonation

D.  

Vishing

E.  

Smishing

F.  

Misinformation

Discussion 0
Questions 29

A hacker gained access to a system via a phishing attempt that was a direct result of a user clicking a suspicious link. The link laterally deployed ransomware, which laid dormant for multiple weeks, across the network. Which of the following would have mitigated the spread?

Options:

A.  

IPS

B.  

IDS

C.  

WAF

D.  

UAT

Discussion 0
Questions 30

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

Options:

A.  

Jump server

B.  

RADIUS

C.  

HSM

D.  

Load balancer

Discussion 0
Questions 31

A client demands at least 99.99% uptime from a service provider's hosted security services. Which of the following documents includes the information the service provider should return to the client?

Options:

A.  

MOA

B.  

SOW

C.  

MOU

D.  

SLA

Discussion 0
Questions 32

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

Options:

A.  

If a security incident occurs on the device, the correct employee can be notified.

B.  

The security team will be able to send user awareness training to the appropriate device.

C.  

Users can be mapped to their devices when configuring software MFA tokens.

D.  

User-based firewall policies can be correctly targeted to the appropriate laptops.

E.  

When conducting penetration testing, the security team will be able to target the desired laptops.

F.  

Company data can be accounted for when the employee leaves the organization.

Discussion 0
Questions 33

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

Options:

A.  

Insider

B.  

Unskilled attacker

C.  

Nation-state

D.  

Hacktivist

Discussion 0
Questions 34

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Select two).

Options:

A.  

Key escrow

B.  

TPM presence

C.  

Digital signatures

D.  

Data tokenization

E.  

Public key management

F.  

Certificate authority linking

Discussion 0
Questions 35

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

Options:

A.  

Encryption

B.  

Hashing

C.  

Masking

D.  

Tokenization

Discussion 0
Questions 36

An administrator finds that all user workstations and servers are displaying a message that is associated with files containing an extension of .ryk. Which of the following types of infections is present on the systems?

Options:

A.  

Virus

B.  

Trojan

C.  

Spyware

D.  

Ransomware

Discussion 0
Questions 37

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?

Options:

A.  

Encryption at rest

B.  

Masking

C.  

Data classification

D.  

Permission restrictions

Discussion 0
Questions 38

Which of the following can be used to identify potential attacker activities without affecting production servers?

Options:

A.  

Honey pot

B.  

Video surveillance

C.  

Zero Trust

D.  

Geofencing

Discussion 0
Questions 39

An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?

Options:

A.  

NGFW

B.  

WAF

C.  

TLS

D.  

SD-WAN

Discussion 0
Questions 40

A small business uses kiosks on the sales floor to display product information for customers. A security team discovers the kiosks use end-of-life operating systems. Which of the following is the security team most likely to document as a security implication of the current architecture?

Options:

A.  

Patch availability

B.  

Product software compatibility

C.  

Ease of recovery

D.  

Cost of replacement

Discussion 0
Questions 41

After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

Options:

A.  

Retain the emails between the security team and affected customers for 30 days.

B.  

Retain any communications related to the security breach until further notice.

C.  

Retain any communications between security members during the breach response.

D.  

Retain all emails from the company to affected customers for an indefinite period of time.

Discussion 0
Questions 42

A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?

Options:

A.  

A worm is propagating across the network.

B.  

Data is being exfiltrated.

C.  

A logic bomb is deleting data.

D.  

Ransomware is encrypting files.

Discussion 0
Questions 43

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

Options:

A.  

Data in use

B.  

Data in transit

C.  

Geographic restrictions

D.  

Data sovereignty

Discussion 0
Questions 44

A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?

Options:

A.  

Deploying PowerShell scripts

B.  

Pushing GPO update

C.  

Enabling PAP

D.  

Updating EDR profiles

Discussion 0
Questions 45

A user is attempting to patch a critical system, but the patch fails to transfer. Which of the following access controls is most likely inhibiting the transfer?

Options:

A.  

Attribute-based

B.  

Time of day

C.  

Role-based

D.  

Least privilege

Discussion 0
Questions 46

You are security administrator investigating a potential infection on a network.

Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.

Options:

Discussion 0
Questions 47

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

Options:

A.  

Default credentials

B.  

Non-segmented network

C.  

Supply chain vendor

D.  

Vulnerable software

Discussion 0
Questions 48

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

Options:

A.  

Federation

B.  

Identity proofing

C.  

Password complexity

D.  

Default password changes

E.  

Password manager

F.  

Open authentication

Discussion 0
Questions 49

An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system. Which of the following best describes the actions taken by the organization?

Options:

A.  

Exception

B.  

Segmentation

C.  

Risk transfer

D.  

Compensating controls

Discussion 0
Questions 50

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

Options:

A.  

Secured zones

B.  

Subject role

C.  

Adaptive identity

D.  

Threat scope reduction

Discussion 0
Questions 51

Which of the following security control types does an acceptable use policy best represent?

Options:

A.  

Detective

B.  

Compensating

C.  

Corrective

D.  

Preventive

Discussion 0