CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 20,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 20,2024
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?
- A . Client
- B . Third-party vendor
- C . Cloud provider
- D . DBA
A client asked a security company to provide a document outlining the project, the cost, and the completion time frame.
Which of the following documents should the company provide to the client?
- A . MSA
- B . SLA
- C . BPA
- D . SOW
A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting.
Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?
- A . Secure cookies
- B . Version control
- C . Input validation
- D . Code signing
Which of the following must be considered when designing a high-availability network? (Choose two).
- A . Ease of recovery
- B . Ability to patch
- C . Physical isolation
- D . Responsiveness
- E . Attack surface
- F . Extensible authentication
A technician needs to apply a high-priority patch to a production system.
Which of the following steps should be taken first?
- A . Air gap the system.
- B . Move the system to a different network segment.
- C . Create a change control request.
- D . Apply the patch to the system.
Which of the following describes the reason root cause analysis should be conducted as part of incident response?
- A . To gather loCs for the investigation
- B . To discover which systems have been affected
- C . To eradicate any trace of malware on the network
- D . To prevent future incidents of the same nature
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
- A . Fines
- B . Audit findings
- C . Sanctions
- D . Reputation damage
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption.
Which of the following best describes this step?
- A . Capacity planning
- B . Redundancy
- C . Geographic dispersion
- D . Tablet exercise
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries.
Which of the following is the most effective way to limit this access?
- A . Data masking
- B . Encryption
- C . Geolocation policy
- D . Data sovereignty regulation
Which of the following is a hardware-specific vulnerability?
- A . Firmware version
- B . Buffer overflow
- C . SQL injection
- D . Cross-site scripting