CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 19,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification.
Which of the following social engineering techniques are being attempted? (Choose two.)
- A . Typosquatting
- B . Phishing
- C . Impersonation
- D . Vishing
- E . Smishing
- F . Misinformation
Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO).
The message stated:
“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”
Which of the following are the best responses to this situation? (Choose two).
- A . Cancel current employee recognition gift cards.
- B . Add a smishing exercise to the annual company training.
- C . Issue a general email warning to the company.
- D . Have the CEO change phone numbers.
- E . Conduct a forensic investigation on the CEO’s phone.
- F . Implement mobile device management.
A company is required to use certified hardware when building networks.
Which of the following best addresses the risks associated with procuring counterfeit hardware?
- A . A thorough analysis of the supply chain
- B . A legally enforceable corporate acquisition policy
- C . A right to audit clause in vendor contracts and SOWs
- D . An in-depth penetration test of all suppliers and vendors
Which of the following provides the details about the terms of a test with a third-party penetration tester?
- A . Rules of engagement
- B . Supply chain analysis
- C . Right to audit clause
- D . Due diligence
A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement.
Which of the following reconnaissance types is the tester performing?
- A . Active
- B . Passive
- C . Defensive
- D . Offensive
Which of the following is required for an organization to properly manage its restore process in the event of system failure?
- A . IRP
- B . DRP
- C . RPO
- D . SDLC
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
- A . Jailbreaking
- B . Memory injection
- C . Resource reuse
- D . Side loading
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
- A . Password spraying
- B . Account forgery
- C . Pass-t he-hash
- D . Brute-force
An analyst is evaluating the implementation of Zero Trust principles within the data plane.
Which of the following would be most relevant for the analyst to evaluate?
- A . Secured zones
- B . Subject role
- C . Adaptive identity
- D . Threat scope reduction
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources.
Which of the following would be the best solution?
- A . RDP server
- B . Jump server
- C . Proxy server
- D . Hypervisor