CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 20,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 20,2024
A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates.
Which of the following should be done next?
- A . Conduct an audit.
- B . Initiate a penetration test.
- C . Rescan the network.
- D . Submit a report.
An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.
Which of the following best describes the user’s activity?
- A . Penetration testing
- B . Phishing campaign
- C . External audit
- D . Insider threat
Which of the following allows for the attribution of messages to individuals?
- A . Adaptive identity
- B . Non-repudiation
- C . Authentication
- D . Access logs
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
- A . Automation
- B . Compliance checklist
- C . Attestation
- D . Manual audit
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
- A . SCAP
- B . Net Flow
- C . Antivirus
- D . DLP
An organization recently updated its security policy to include the following statement:
Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and ? from variables set by forms in a web application.
Which of the following best explains the security technique the organization adopted by making this addition to the policy?
- A . Identify embedded keys
- B . Code debugging
- C . Input validation
- D . Static code analysis
A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message.
Which of the following should the analyst do?
- A . Place posters around the office to raise awareness of common phishing activities.
- B . Implement email security filters to prevent phishing emails from being delivered
- C . Update the EDR policies to block automatic execution of downloaded programs.
- D . Create additional training for users to recognize the signs of phishing attempts.
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
- A . Compensating control
- B . Network segmentation
- C . Transfer of risk
- D . SNMP traps
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
- A . Compensating control
- B . Network segmentation
- C . Transfer of risk
- D . SNMP traps
The management team notices that new accounts that are set up manually do not always have correct access or permissions.
Which of the following automation techniques should a systems administrator use to streamline account creation?
- A . Guard rail script
- B . Ticketing workflow
- C . Escalation script
- D . User provisioning script