CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Apr 26,2025.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Apr 26,2025
A client asked a security company to provide a document outlining the project, the cost, and the completion time frame.
Which of the following documents should the company provide to the client?
- A . MSA
- B . SLA
- C . BPA
- D . SOW
A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting.
Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?
- A . Secure cookies
- B . Version control
- C . Input validation
- D . Code signing
Which of the following must be considered when designing a high-availability network? (Choose two).
- A . Ease of recovery
- B . Ability to patch
- C . Physical isolation
- D . Responsiveness
- E . Attack surface
- F . Extensible authentication
A technician needs to apply a high-priority patch to a production system.
Which of the following steps should be taken first?
- A . Air gap the system.
- B . Move the system to a different network segment.
- C . Create a change control request.
- D . Apply the patch to the system.
Which of the following describes the reason root cause analysis should be conducted as part of incident response?
- A . To gather loCs for the investigation
- B . To discover which systems have been affected
- C . To eradicate any trace of malware on the network
- D . To prevent future incidents of the same nature
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
- A . Fines
- B . Audit findings
- C . Sanctions
- D . Reputation damage
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption.
Which of the following best describes this step?
- A . Capacity planning
- B . Redundancy
- C . Geographic dispersion
- D . Tablet exercise
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries.
Which of the following is the most effective way to limit this access?
- A . Data masking
- B . Encryption
- C . Geolocation policy
- D . Data sovereignty regulation
Which of the following is a hardware-specific vulnerability?
- A . Firmware version
- B . Buffer overflow
- C . SQL injection
- D . Cross-site scripting
While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable.
Which of the following actions would prevent this issue?
- A . Documenting the new policy in a change request and submitting the request to change management
- B . Testing the policy in a non-production environment before enabling the policy in the production network
- C . Disabling any intrusion prevention signatures on the ‘deny any* policy prior to enabling the new policy
- D . Including an ‘allow any1 policy above the ‘deny any* policy