CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Nov 20,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Nov 20,2024
Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?
- A . VM escape
- B . SQL injection
- C . Buffer overflow
- D . Race condition
Which of the following would be the best way to handle a critical business application that is running on a legacy server?
- A . Segmentation
- B . Isolation
- C . Hardening
- D . Decommissioning
Which of the following describes the process of concealing code or text inside a graphical image?
- A . Symmetric encryption
- B . Hashing
- C . Data masking
- D . Steganography
After a company was compromised, customers initiated a lawsuit. The company’s attorneys have requested that the security team initiate a legal hold in response to the lawsuit.
Which of the following describes the action the security team will most likely be required to take?
- A . Retain the emails between the security team and affected customers for 30 days.
- B . Retain any communications related to the security breach until further notice.
- C . Retain any communications between security members during the breach response.
- D . Retain all emails from the company to affected customers for an indefinite period of time.
A network manager wants to protect the company’s VPN by implementing multifactor authentication that uses:
. Something you know
. Something you have
. Something you are
Which of the following would accomplish the manager’s goal?
- A . Domain name, PKI, GeolP lookup
- B . VPN IP address, company ID, facial structure
- C . Password, authentication token, thumbprint
- D . Company URL, TLS certificate, home address
A security manager created new documentation to use in response to various types of security incidents.
Which of the following is the next step the manager should take?
- A . Set the maximum data retention policy.
- B . Securely store the documents on an air-gapped network.
- C . Review the documents’ data classification policy.
- D . Conduct a tabletop exercise with the team.
Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked.
Which of the following changes would allow users to access the site?
- A . Creating a firewall rule to allow HTTPS traffic
- B . Configuring the IPS to allow shopping
- C . Tuning the DLP rule that detects credit card data
- D . Updating the categorization in the content filter
An administrator discovers that some files on a database server were recently encrypted. The administrator sees from the security logs that the data was last accessed by a domain user.
Which of the following best describes the type of attack that occurred?
- A . Insider threat
- B . Social engineering
- C . Watering-hole
- D . Unauthorized attacker
Which of the following automation use cases would best enhance the security posture of an organization by rapidly updating permissions when employees leave a company?
- A . Provisioning resources
- B . Disabling access
- C . Reviewing change approvals
- D . Escalating permission requests
Which of the following must be considered when designing a high-availability network? (Select two).
- A . Ease of recovery
- B . Ability to patch
- C . Physical isolation
- D . Responsiveness
- E . Attack surface
- F . Extensible authentication