CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 20,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 20,2024
While troubleshooting a firewall configuration, a technician determines that a “deny any” policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable.
Which of the following actions would prevent this issue?
- A . Documenting the new policy in a change request and submitting the request to change management
- B . Testing the policy in a non-production environment before enabling the policy in the production network
- C . Disabling any intrusion prevention signatures on the ‘deny any* policy prior to enabling the new policy
- D . Including an ‘allow any1 policy above the ‘deny any* policy
An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days.
Which of the following types of sites is the best for this scenario?
- A . Real-time recovery
- B . Hot
- C . Cold
- D . Warm
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling.
Which of the following best describes this policy?
- A . Enumeration
- B . Sanitization
- C . Destruction
- D . Inventory
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure.
Which of the following data classifications should be used to secure patient data?
- A . Private
- B . Critical
- C . Sensitive
- D . Public
A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations.
Which of the following should the hosting provider consider first?
- A . Local data protection regulations
- B . Risks from hackers residing in other countries
- C . Impacts to existing contractual obligations
- D . Time zone differences in log correlation
Which of the following would be the best way to block unknown programs from executing?
- A . Access control list
- B . Application allow list.
- C . Host-based firewall
- D . DLP solution
A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering.
Which of the following teams will conduct this assessment activity?
- A . White
- B . Purple
- C . Blue
- D . Red
A software development manager wants to ensure the authenticity of the code created by the company.
Which of the following options is the most appropriate?
- A . Testing input validation on the user input fields
- B . Performing code signing on company-developed software
- C . Performing static code analysis on the software
- D . Ensuring secure cookies are use
Which of the following can be used to identify potential attacker activities without affecting production servers?
- A . Honey pot
- B . Video surveillance
- C . Zero Trust
- D . Geofencing
During an investigation, an incident response team attempts to understand the source of an incident.
Which of the following incident response activities describes this process?
- A . Analysis
- B . Lessons learned
- C . Detection
- D . Containment