CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 20,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 20,2024
A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis.
Which of the following types of controls is the company setting up?
- A . Corrective
- B . Preventive
- C . Detective
- D . Deterrent
A systems administrator is looking for a low-cost application-hosting solution that is cloud-based.
Which of the following meets these requirements?
- A . Serverless framework
- B . Type 1 hvpervisor
- C . SD-WAN
- D . SDN
A security operations center determines that the malicious activity detected on a server is normal.
Which of the following activities describes the act of ignoring detected activity in the future?
- A . Tuning
- B . Aggregating
- C . Quarantining
- D . Archiving
A security analyst reviews domain activity logs and notices the following:
Which of the following is the best explanation for what the security analyst has discovered?
- A . The user jsmith’s account has been locked out.
- B . A keylogger is installed on [smith’s workstation
- C . An attacker is attempting to brute force ismith’s account.
- D . Ransomware has been deployed in the domain.
A company is concerned about weather events causing damage to the server room and downtime.
Which of the following should the company consider?
- A . Clustering servers
- B . Geographic dispersion
- C . Load balancers
- D . Off-site backups
Which of the following is a primary security concern for a company setting up a BYOD program?
- A . End of life
- B . Buffer overflow
- C . VM escape
- D . Jailbreaking
A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks.
Which of the following analysis elements did the company most likely use in making this decision?
- A . IMTTR
- B . RTO
- C . ARO
- D . MTBF
Which of the following is the most likely to be included as an element of communication in a security awareness program?
- A . Reporting phishing attempts or other suspicious activities
- B . Detecting insider threats using anomalous behavior recognition
- C . Verifying information when modifying wire transfer data
- D . Performing social engineering as part of third-party penetration testing
HOTSPOT
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
HOTSPOT
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.