CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Apr 23,2025.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Apr 23,2025
Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO).
The message stated:
“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”
Which of the following are the best responses to this situation? (Choose two).
- A . Cancel current employee recognition gift cards.
- B . Add a smishing exercise to the annual company training.
- C . Issue a general email warning to the company.
- D . Have the CEO change phone numbers.
- E . Conduct a forensic investigation on the CEO’s phone.
- F . Implement mobile device management.
A company is required to use certified hardware when building networks.
Which of the following best addresses the risks associated with procuring counterfeit hardware?
- A . A thorough analysis of the supply chain
- B . A legally enforceable corporate acquisition policy
- C . A right to audit clause in vendor contracts and SOWs
- D . An in-depth penetration test of all suppliers and vendors
Which of the following provides the details about the terms of a test with a third-party penetration tester?
- A . Rules of engagement
- B . Supply chain analysis
- C . Right to audit clause
- D . Due diligence
A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement.
Which of the following reconnaissance types is the tester performing?
- A . Active
- B . Passive
- C . Defensive
- D . Offensive
Which of the following is required for an organization to properly manage its restore process in the event of system failure?
- A . IRP
- B . DRP
- C . RPO
- D . SDLC
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
- A . Jailbreaking
- B . Memory injection
- C . Resource reuse
- D . Side loading
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
- A . Password spraying
- B . Account forgery
- C . Pass-t he-hash
- D . Brute-force
An analyst is evaluating the implementation of Zero Trust principles within the data plane.
Which of the following would be most relevant for the analyst to evaluate?
- A . Secured zones
- B . Subject role
- C . Adaptive identity
- D . Threat scope reduction
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources.
Which of the following would be the best solution?
- A . RDP server
- B . Jump server
- C . Proxy server
- D . Hypervisor
A company’s web filter is configured to scan the URL for strings and deny access when matches are found.
Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?
- A . encryption=off
- B . http://
- C . www.*.com
- D . :443