CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 19,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 19,2024
A company’s web filter is configured to scan the URL for strings and deny access when matches are found.
Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?
- A . encryption=off
- B . http://
- C . www.*.com
- D . :443
A company’s web filter is configured to scan the URL for strings and deny access when matches are found.
Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?
- A . encryption=off
- B . http://
- C . www.*.com
- D . :443
4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network.
Which of the following fulfills this request?
- A . access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32
- B . access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0
- C . access-list inbound permit ig source 10.1.4.9/32 destination 0.0.0.0/0
- D . access-list inbound permit ig source 0.0.0.0/0 destination 10.1.4.9/32
A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary.
Which of the following methods is most secure?
- A . Implementing a bastion host
- B . Deploying a perimeter network
- C . Installing a WAF
- D . Utilizing single sign-on
A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation.
Which of the following logs should the analyst use as a data source?
- A . Application
- B . IPS/IDS
- C . Network
- D . Endpoint
A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.
SIEM alerts have not yet been configured.
Which of the following best describes what the security analyst should do to identify this behavior?
- A . [Digital forensics
- B . E-discovery
- C . Incident response
- D . Threat hunting
A company purchased cyber insurance to address items listed on the risk register.
Which of the following strategies does this represent?
- A . Accept
- B . Transfer
- C . Mitigate
- D . Avoid
A security administrator would like to protect data on employees’ laptops.
Which of the following encryption techniques should the security administrator use?
- A . Partition
- B . Asymmetric
- C . Full disk
- D . Database
Which of the following security control types does an acceptable use policy best represent?
- A . Detective
- B . Compensating
- C . Corrective
- D . Preventive
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software.
Which of the following security techniques is the IT manager setting up?
- A . Hardening
- B . Employee monitoring
- C . Configuration enforcement
- D . Least privilege