CompTIA SY0-701 Real Exam Questions
The questions for SY0-701 were last updated at Dec 08,2024.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Dec 08,2024
An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days.
Which of the following types of sites is the best for this scenario?
- A . Real-time recovery
- B . Hot
- C . Cold
- D . Warm
An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords.
Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
- A . Multifactor authentication
- B . Permissions assignment
- C . Access management
- D . Password complexity
Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?
- A . Insider
- B . Unskilled attacker
- C . Nation-state
- D . Hacktivist
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification.
Which of the following social engineering techniques are being attempted? (Choose two.)
- A . Typosquatting
- B . Phishing
- C . Impersonation
- D . Vishing
- E . Smishing
- F . Misinformation
A company’s web filter is configured to scan the URL for strings and deny access when matches are found.
Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?
- A . encryption=off
- B . http://
- C . www.*.com
- D . :443
4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network.
Which of the following fulfills this request?
- A . access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32
- B . access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0
- C . access-list inbound permit ig source 10.1.4.9/32 destination 0.0.0.0/0
- D . access-list inbound permit ig source 0.0.0.0/0 destination 10.1.4.9/32
Which of the following describes the reason root cause analysis should be conducted as part of incident response?
- A . To gather loCs for the investigation
- B . To discover which systems have been affected
- C . To eradicate any trace of malware on the network
- D . To prevent future incidents of the same nature
A security analyst is reviewing the following logs:
Which of the following attacks is most likely occurring?
- A . Password spraying
- B . Account forgery
- C . Pass-t he-hash
- D . Brute-force
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries.
Which of the following is the most effective way to limit this access?
- A . Data masking
- B . Encryption
- C . Geolocation policy
- D . Data sovereignty regulation
An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.
Which of the following best describes the user’s activity?
- A . Penetration testing
- B . Phishing campaign
- C . External audit
- D . Insider threat