Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free SY0-701 CompTIA Security+ Exam 2026 Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA SY0-701 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Security+ Exam 2026 exam materials available for free to everyone. You can take the Free SY0-701 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

A.

DLP software

B.

DNS filtering

C.

File integrity monitoring

D.

Stateful firewall

Question # 7

Which of the following is a prerequisite for a DLP solution?

A.

Data destruction

B.

Data sanitization

C.

Data classification

D.

Data masking

Question # 8

Which of the following describes the maximum allowance of accepted risk?

A.

Risk indicator

B.

Risk level

C.

Risk score

D.

Risk threshold

Question # 9

A company is utilizing an offshore team to help support the finance department. The company wants to keep the data secure by keeping it on a company device but does not want to provide equipment to the offshore team. Which of the following should the company implement to meet this requirement?

A.

VDI

B.

MDM

C.

VPN

D.

VPC

Question # 10

An organization issued new laptops to all employees and wants to provide web filtering both in and out of the office without configuring additional access to the network. Which of the following types of web filtering should a systems administrator configure?

A.

Agent-based

B.

Centralized proxy

C.

URL scanning

D.

Content categorization

Question # 11

A company experiences a data loss event due to a stolen laptop. In order to prevent future similar events, a security analyst must implement a scalable solution to ensure all data on company laptops remains secure in the event of theft or loss. Which of the following should the analyst do next?

A.

Configure the HSM for each device and store recovery keys centrally.

B.

Implement LAPS to ensure secure password rotation for administrative accounts.

C.

Use an MDM platform to manage the devices and force security configurations.

D.

Ensure that each laptop has the secure enclave properly initialized in the BIOS.

Question # 12

Which of the following security controls are a company implementing by deploying HIPS? (Select two).

A.

Directive

B.

Preventive

C.

Physical

D.

Corrective

E.

Compensating

F.

Detective

Question # 13

Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

A.

SCAP

B.

Net Flow

C.

Antivirus

D.

DLP

Question # 14

The private key for a website was stolen, and a new certificate has been issued. Which of the following needs to be updated next?

A.

SCEP

B.

CRL

C.

OCSP

D.

CSR

Question # 15

An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?

A.

Partially known environment

B.

Unknown environment

C.

Integrated

D.

Known environment

Question # 16

A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?

A.

A thorough analysis of the supply chain

B.

A legally enforceable corporate acquisition policy

C.

A right to audit clause in vendor contracts and SOWs

D.

An in-depth penetration test of all suppliers and vendors

Question # 17

Which of the following best describes a common use of OSINT?

A.

Monitoring internal systems and network traffic to detect abnormal behavior

B.

Installing and configuring security patches to fix known vulnerabilities

C.

Collecting information from public platforms to find possible security exposures

D.

Encrypting sensitive company data and storing it securely in the cloud

Question # 18

A Chief Information Security Officer (CISO) develops information security policies that relate to the software development methodology. Which of the following will the CISO most likely include in the organization ' s documentation?

A.

Peer review requirements

B.

Multifactor authentication

C.

Branch protection tests

D.

Secrets management configurations

Question # 19

A company uses its backups to recover from a ransomware attack. Which of the following best guarantees that the backups are not infected?

A.

Immutability

B.

Destruction

C.

Sanitization

D.

Retention

Question # 20

Which of the following is the best method to reduce the attack surface of an enterprise network?

A.

Disable unused network services on servers.

B.

Use port security for wired connections.

C.

Change default passwords for network printers.

D.

Create a guest wireless network for visitors.

Question # 21

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

A.

Compensating control

B.

Network segmentation

C.

Transfer of risk

D.

SNMP traps

Question # 22

Which of the following is a preventive physical security control?

A.

Video surveillance system

B.

Bollards

C.

Alarm system

D.

Motion sensors

Question # 23

A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?

A.

Server multiprocessing

B.

Warm site

C.

Load balancer

D.

Proxy server

Question # 24

The management team notices that new accounts that are set up manually do not always have correct access or permissions.

Which of the following automation techniques should a systems administrator use to streamline account creation?

A.

Guard rail script

B.

Ticketing workflow

C.

Escalation script

D.

User provisioning script

Question # 25

Which of the following must be considered when designing a high-availability network? (Choose two).

A.

Ease of recovery

B.

Ability to patch

C.

Physical isolation

D.

Responsiveness

E.

Attack surface

F.

Extensible authentication

Question # 26

A company processes personal data from customers in multiple countries. Which of the following actions is most critical for maintaining legal compliance with global privacy regulations?

A.

Storing all customer data on encrypted local servers

B.

Hiring a data privacy officer to review contracts

C.

Ensuring DPAs are in place with third-party vendors

D.

Using strong passwords and firewalls on all endpoints

Question # 27

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?

A.

Local data protection regulations

B.

Risks from hackers residing in other countries

C.

Impacts to existing contractual obligations

D.

Time zone differences in log correlation

Question # 28

Which of the following explains how regular patching helps mitigate risks when securing an enterprise environment?

A.

It improves server performance by reducing software bugs.

B.

It addresses known software vulnerabilities before they are exploited.

C.

It eliminates the need for firewalls and intrusion detection.

D.

It removes the need for antivirus tools.

Question # 29

A penetration test identifies that an SMBvl Is enabled on multiple servers across an organization. The organization wants to remediate this vulnerability in the most efficient way possible. Which of the following should the organization use for this purpose?

A.

GPO

B.

ACL

C.

SFTP

D.

DLP

Question # 30

A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Select two.)

A.

Tokenization

B.

Cryptographic downgrade

C.

SSH tunneling

D.

Segmentation

E.

Patch installation

F.

Data masking

Question # 31

A company expects its provider to ensure servers and networks maintain 97% uptime. Which of the following would most likely list this expectation?

A.

BPA

B.

MOU

C.

NDA

D.

SLA

Question # 32

Which of the following agreement types defines the time frame in which a vendor needs to respond?

A.

SOW

B.

SLA

C.

MOA

D.

MOU

Question # 33

As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?

A.

Configure firewall rules to block external access to Internal resources.

B.

Set up a WAP to allow internal access from public networks.

C.

Implement a new IPSec tunnel from internal resources.

D.

Deploy an Internal Jump server to access resources.

Question # 34

Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?

A.

Remote access points should fail closed.

B.

Logging controls should fail open.

C.

Safety controls should fail open.

D.

Logical security controls should fail closed.

Question # 35

Which of the following best represents how frequently an incident is expected to happen each year?

A.

RTO

B.

ALE

C.

SLE

D.

ARO

Question # 36

A company is experiencing issues with employees leaving the company for a competitor and taking customer contact information with them. Which of the following tools will help prevent this from reoccurring?

A.

FIM

B.

NAC

C.

IDS

D.

UBA

Question # 37

While reviewing logs, a security administrator identifies the following code:

< script > function(send_info) < /script >

Which of the following best describes the vulnerability being exploited?

A.

XSS

B.

SQLi

C.

DDoS

D.

CSRF

Question # 38

Which of the following attacks primarily targets insecure networks?

A.

Evil twin

B.

Impersonation

C.

Watering hole

D.

Pretexting

Question # 39

Which of the following explains why an attacker cannot easily decrypt passwords using a rainbow table attack?

A.

Digital signatures

B.

Salting

C.

Hashing

D.

Perfect forward secrecy

Question # 40

Which of the following vulnerabilities would likely be mitigated by setting up an MDM platform?

A.

TPM

B.

Buffer overflow

C.

Jailbreaking

D.

SQL injection

Question # 41

Alerts from email protection systems and MSSPs must be entered into an IT service management system and assigned to the security team. Which of the following should an organization implement to enable this functionality?

A.

Automated compliance monitoring

B.

Automated ticket creation

C.

Automated vulnerability scans

D.

Automated indicator sharing

Question # 42

A legacy device is being decommissioned and is no longer receiving updates or patches. Which of the following describes this scenario?

A.

End of business

B.

End of testing

C.

End of support

D.

End of life

Question # 43

Which of the following would a systems administrator follow when upgrading the firmware of an organization ' s router?

A.

Software development life cycle

B.

Risk tolerance

C.

Certificate signing request

D.

Maintenance window

Question # 44

Which of the following is the first step to secure a newly deployed server?

A.

Close unnecessary service ports.

B.

Update the current version of the software.

C.

Add the device to the ACL.

D.

Upgrade the OS version.

Question # 45

Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?

A.

Availability

B.

Accounting

C.

Authentication

D.

Authorization

Question # 46

A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?

A.

Validate the code signature.

B.

Execute the code in a sandbox.

C.

Search the executable for ASCII strings.

D.

Generate a hash of the files.

Question # 47

An administrator must replace an expired SSL certificate. Which of the following does the administrator need to create the new SSL certificate?

A.

CSR

B.

OCSP

C.

Key

D.

CRL

Question # 48

An administrator is reviewing a single server ' s security logs and discovers the following;

Which of the following best describes the action captured in this log file?

A.

Brute-force attack

B.

Privilege escalation

C.

Failed password audit

D.

Forgotten password by the user

Question # 49

Which of the following is a benefit of launching a bug bounty program? (Select two)

A.

Transference of risk to a third party

B.

Reduction in the number of zero-day vulnerabilities

C.

Increased security awareness for the workforce

D.

Reduced cost of managing the program

E.

Quicker discovery of vulnerabilities

F.

Improved patch management process

Question # 50

A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?

A.

Serverless architecture

B.

Thin clients

C.

Private cloud

D.

Virtual machines

Question # 51

Which of the following is an example of a false negative vulnerability detection in a scan report?

A.

A vulnerability that does not actually exist

B.

A vulnerability that has already been remediated

C.

A result that shows no known vulnerability

D.

A zero-day vulnerability with a known remediation

Question # 52

Which of the following should a technician perform to verify the integrity of a file transferred from one device to another?

A.

Authentication

B.

Obfuscation

C.

Hashing

D.

Encryption

Question # 53

An administrator discovers a cross-site scripting vulnerability on a company website. Which of the following will most likely remediate the issue?

A.

Input validation

B.

NGFW

C.

Vulnerability scan

D.

WAF

Question # 54

A company discovered its data was advertised for sale on the dark web. During the initial investigation, the company determined the data was proprietary data. Which of the following is the next step the company should take?

A.

Identity the attacker sentry methods.

B.

Report the breach to the local authorities.

C.

Notify the applicable parties of the breach.

D.

Implement vulnerability scanning of the company ' s systems.

Question # 55

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

A.

Insider

B.

Unskilled attacker

C.

Nation-state

D.

Hacktivist

Question # 56

Which of the following Is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?

A.

Open-source intelligence

B.

Port scanning

C.

Pivoting

D.

Exploit validation

Question # 57

A company performs risk analysis on its equipment and estimates it will experience about ten incidents over a five-year period. Which of the following is the correct ARO for the equipment?

A.

2

B.

5

C.

10

D.

50

Question # 58

During a security incident, the security operations team identified sustained network traffic from a malicious IP address:

10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?

A.

access-list inbound deny ig source 0.0.0.0/0 destination 10.1.4.9/32

B.

access-list inbound deny ig source 10.1.4.9/32 destination 0.0.0.0/0

C.

access-list inbound permit ig source 10.1.4.9/32 destination 0.0.0.0/0

D.

access-list inbound permit ig source 0.0.0.0/0 destination 10.1.4.9/32

Question # 59

While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website. Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?

A.

Secure cookies

B.

Input sanitization

C.

Code signing

D.

Blocklist

Question # 60

Which of the following describes effective change management procedures?

A.

Approving the change after a successful deployment

B.

Having a backout plan when a patch fails

C.

Using a spreadsheet for tracking changes

D.

Using an automatic change control bypass for security updates

Question # 61

An organization is developing a security program that conveys the responsibilities associated with the general operation of systems and software within the organization. Which of the following documents would most likely communicate these expectations?

A.

Business continuity plan

B.

Change management procedure

C.

Acceptable use policy

D.

Software development life cycle policy

Question # 62

A company wants to minimize the chance of its outgoing marketing emails getting flagged as spam. The company decides to list the email servers on the proper DNS record. Which of the following protocols should the company apply next?

A.

DMARC

B.

DLP

C.

DKIM

D.

SPF

Question # 63

Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?

A.

Automated scanning

B.

Penetration testing

C.

Threat hunting

D.

Log aggregation

E.

Adversarial emulation

Question # 64

A smart lighting system is deployed in an office building. The devices connect to the corporate Wi-Fi and are managed via a cloud portal. Which of the following security techniques reduces risk for these IoT devices?

A.

Assigning static IP addresses to the devices

B.

Updating default credentials and applying network segmentation

C.

Connecting the devices to the guest Wi-Fi to prevent interactions with corporate IT

D.

Allowing the vendor to have remote access for day-to-day management

Question # 65

Which of the following technologies assists in passively verifying the expired status of a digital certificate?

A.

OCSP

B.

CRL

C.

TPM

D.

CSR

Question # 66

Which of the following describes the process of concealing code or text inside a graphical image?

A.

Symmetric encryption

B.

Hashing

C.

Data masking

D.

Steganography

Question # 67

A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

A.

Air gap the system.

B.

Move the system to a different network segment.

C.

Create a change control request.

D.

Apply the patch to the system.

Question # 68

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO ' s report?

A.

Insider threat

B.

Hacktivist

C.

Nation-state

D.

Organized crime

Question # 69

A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?

A.

Buffer overflow

B.

NTP amplification attack

C.

Worm

D.

Kerberoasting attack

Question # 70

Prior to implementing a design change, the change must go through multiple steps to ensure that it does not cause any security issues. Which of the following is most likely to be one of those steps?

A.

Management review

B.

Load testing

C.

Maintenance notifications

D.

Procedure updates

Question # 71

Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).

A.

Channels by which the organization communicates with customers

B.

The reporting mechanisms for ethics violations

C.

Threat vectors based on the industry in which the organization operates

D.

Secure software development training for all personnel

E.

Cadence and duration of training events

F.

Retraining requirements for individuals who fail phishing simulations

Question # 72

A customer has a contract with a CSP and wants to identify which controls should be implemented in the IaaS enclave. Which of the following is most likely to contain this information?

A.

Statement of work

B.

Responsibility matrix

C.

Service-level agreement

D.

Master service agreement

Question # 73

A company ' s Chief Information Security Officer (CISO) wants to enhance the capabilities of the incident response team. The CISO directs the incident response team to deploy a tool that rapidlyanalyzes host and network data from potentially compromised systems and forwards the data for further review. Which of the following tools should the incident response team deploy?

A.

NAC

B.

IPS

C.

SIEM

D.

EDR

Question # 74

Which of the following is a feature of a next-generation SIEM system?

A.

Virus signatures

B.

Automated response actions

C.

Security agent deployment

D.

Vulnerability scanning

Question # 75

An organization ' s web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization ' s web servers? (Select two).

A.

Regularly updating server software and patches

B.

Implementing strong password policies

C.

Encrypting sensitive data at rest and in transit

D.

Utilizing a web-application firewall

E.

Performing regular vulnerability scans

F.

Removing payment information from the servers

Question # 76

An MSSP manages firewalls for hundreds of clients. Which of the following tools would be most helpful to create a standard configuration template in order to improve the efficiency of firewall changes?

A.

SNMP

B.

Benchmarks

C.

Netflow

D.

SCAP

Question # 77

Which of the following can be used to identify potential attacker activities without affecting production servers?

A.

Honey pot

B.

Video surveillance

C.

Zero Trust

D.

Geofencing

Question # 78

Which of the following is the main consideration when a legacy system that is a critical part of a company ' s infrastructure cannot be replaced?

A.

Resource provisioning

B.

Cost

C.

Single point of failure

D.

Complexity

Question # 79

Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?

A.

Policies and procedures

B.

Asset management

C.

Vulnerability assessment

D.

Business impact analysis

Question # 80

A forensic engineer determines that the root cause of a compromise is a SQL injection attack. Which of the following should the engineer review to identify the command used by the threat actor?

A.

Metadata

B.

Application log

C.

System log

D.

Netflow log

Question # 81

A security analyst must select a metric to determine the required investment in technology based on past availability incidents. Which of the following is the most relevant value to help select technology that mitigates risk and considers reliability?

A.

MTBF

B.

RTO

C.

ALE

D.

RPO

Question # 82

A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Select two).

A.

Private

B.

Confidential

C.

Public

D.

Operational

E.

Urgent

F.

Restricted

Question # 83

A software company currently secures access using a combination of traditional username/password configurations and one-time passwords for MFA. However, employees still struggle to maintain both a password manager and the authenticator application. The company wants to migrate to a single, integrated authentication solution that is more secure and provides a smoother login experience for its employees. Which of the following solutions will best satisfy the company ' s needs?

A.

Migrating to FIDO2 passkeys, utilizing built-in device biometrics for user authentication

B.

Implementing SMS-based one-time passwords as the primary second factor for all logins

C.

Implementing SAML federation across authentication servers so employees can use SSO to access applications

D.

Deploying a PKI system that requires all employees to use smart cards for login access

Question # 84

A company installed cameras and added signs to alert visitors that they are being recorded. Which of the following controls did the company implement? (Select two).

A.

Directive

B.

Deterrent

C.

Preventive

D.

Detective

E.

Corrective

F.

Technical

Question # 85

A systems administrator needs to ensure the secure communication of sensitive data within the organization ' s private cloud. Which of the following is the best choice for the administrator to implement?

A.

IPSec

B.

SHA-1

C.

RSA

D.

TGT

Question # 86

At the start of a penetration test, the tester checks OSINT resources for information about the client environment. Which of the following types of reconnaissance is the tester performing?

A.

Active

B.

Passive

C.

Offensive

D.

Defensive

Question # 87

Malware spread across a company ' s network after an employee visited a compromised industry blog. Which of the following best describes this type of attack?

A.

Impersonation

B.

Disinformation

C.

Watering-hole

D.

Smishing

Question # 88

An engineer has ensured that the switches are using the latest OS, the servers have the latest patches, and the endpoints ' definitions are up to date. Which of the following will these actions most effectively prevent?

A.

Zero-day attacks

B.

Insider threats

C.

End-of-life support

D.

Known exploits

Question # 89

A security engineer receives reports of unauthorized devices on the organization ' s network. Which of the following best describes a secure and effective way to mitigate the risks?

A.

Deploy a NAC solution to block wireless connections until devices can be verified against the baseline configuration.

B.

Set the NAC solution to only accept handshakes initiated from a static set of IP addresses.

C.

Configure a NAC solution to enforce 802.1X authentication with device certificates and implement endpoint security checks.

D.

Implement a NAC solution that redirects all devices to the guest Wi-Fi for holding until a security analyst can validate the security compliance.

Question # 90

Which of the following is most likely in a responsibility matrix in a cloud computing environment?

A.

The customer is responsible for information and data regardless of the cloud model used.

B.

The cloud provider is responsible for account and identity management for connected devices.

C.

The customer and the cloud provider share responsibility for the physical network infrastructure.

D.

The cloud provider is responsible for the security of endpoints connected to the infrastructure.

Question # 91

An employee used a company ' s billing system to issue fraudulent checks. The administrator is looking for evidence of other occurrences of this activity. Which of the following should the administrator examine?

A.

Application logs

B.

Vulnerability scanner logs

C.

IDS/IPS logs

D.

Firewall logs

Question # 92

Which of the following data types best describes an AI tool developed by a company to automate the ticketing system under a specific contract?

A.

Classified

B.

Regulated information

C.

Open source

D.

Intellectual property

Question # 93

Which of the following security threats aims to compromise a website that multiple employees frequently visit?

A.

Supply chain

B.

Typosquatting

C.

Watering hole

D.

Impersonation

Question # 94

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

A.

Insurance

B.

Patching

C.

Segmentation

D.

Replacement

Question # 95

Which of the following is the most important element when defining effective security governance?

A.

Discovering and documenting external considerations

B.

Developing procedures for employee onboarding and offboarding

C.

Assigning roles and responsibilities for owners, controllers, and custodians

D.

Defining and monitoring change management procedures

Question # 96

A security analyst must prevent remote users from accessing malicious URLs. The sites need to be checked inline for reputation, content, or categorization. Which of the following technologies will help secure the enterprise?

A.

VPN

B.

SASE

C.

IDS

D.

SD-WAN

Question # 97

An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?

A.

SSH

B.

SRTP

C.

S/MIME

D.

PPTP

Question # 98

Which of the following considerations is the most important for an organization to evaluate as it establishes and maintains a data privacy program?

A.

Reporting structure for the data privacy officer

B.

Request process for data subject access

C.

Role as controller or processor

D.

Physical location of the company

Question # 99

Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?

A.

Preparation

B.

Recovery

C.

Lessons learned

D.

Analysis

Question # 100

An external security assessment report indicates a high click rate on suspicious emails. The Chief Intelligence Security Officer (CISO) must reduce this behavior. Which of the following should the CISO do first?

A.

Update the acceptable use policy.

B.

Deploy a password management solution.

C.

Issue warning letters to affected users.

D.

Implement a phishing awareness campaign.

Question # 101

A security team wants WAF policies to be automatically created when applications are deployed. Which concept describes this capability?

A.

IaC

B.

IoT

C.

IoC

D.

IaaS

Question # 102

An external vendor recently visited a company ' s headquarters tor a presentation. Following the visit a member of the hosting team found a file that the external vendor left behind on a server. The file contained detailed architecture information and code snippets. Which of the following data types best describes this file?

A.

Government

B.

Public

C.

Proprietary

D.

Critical

Question # 103

Which of the following best represents an application that does not have an on-premises requirement and is accessible from anywhere?

A.

Pass

B.

Hybrid cloud

C.

Private cloud

D.

IaaS

E.

SaaS

Question # 104

Which of the following activities would involve members of the incident response team and other stakeholders simul-ating an event?

A.

Lessons learned

B.

Digital forensics

C.

Tabletop exercise

D.

Root cause analysis

Question # 105

Which of the following best explains the use of a policy engine in a Zero Trust environment?

A.

It is used by a central server to apply default permissions across a range of network and computing resources.

B.

It is used to make access control decisions without inheriting permission decisions from prior events.

C.

It is used to dynamically assign user permissions based on a user ' s identity and previous activity.

D.

It is used when user roles are unknown and the organization wants to leverage ML to control access.

Question # 106

Which of the following would be best suited for constantly changing environments?

A.

RTOS

B.

Containers

C.

Embedded systems

D.

SCADA

Question # 107

A penetration tester visits a client’s website and downloads the site ' s content. Which of the following actions is the penetration tester performing?

A.

Unknown environment testing

B.

Vulnerability scan

C.

Due diligence

D.

Passive reconnaissance

Question # 108

Which of the following technologies must be used in an organization that intends to automate infrastructure deployment?

A.

IaC

B.

IaaS

C.

IoC

D.

IoT

Question # 109

The Chief Information Security Officer (CISO) requires that new servers include hardware-level memory encryption. Which of the following data states does the CISO want to protect?

A.

Data in use

B.

Data at rest

C.

Data in transit

D.

Data sovereignty

Question # 110

A systems administrator is changing the password policy within an enterprise environment and wants this update implemented on all systems as quickly as possible. Which of the following operating system security measures will the administrator most likely use?

A.

Deploying PowerShell scripts

B.

Pushing GPO update

C.

Enabling PAP

D.

Updating EDR profiles

Question # 111

A cybersecurity incident response team at a large company receives notification that malware is present on several corporate desktops No known Indicators of compromise have been found on the network. Which of the following should the team do first to secure the environment?

A.

Contain the Impacted hosts

B.

Add the malware to the application blocklist.

C.

Segment the core database server.

D.

Implement firewall rules to block outbound beaconing

Question # 112

An employee asks a security analyst to scan a suspicious email that contains a link to a file on a file-sharing site. The analyst determines that the file is safe after downloading and scanning the file with antivirus software. When the employee opens the file, their device is infected with ransomware. Which of the following steps should the analyst have taken?

A.

Review the file in a code editor.

B.

Monitor the file connections with netstat.

C.

Execute the file in a sandbox.

D.

Retrieve the file hash and check with OSINT.

Question # 113

Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?

A.

Firewall

B.

IDS

C.

Honeypot

D.

Layer 3 switch

Question # 114

A security analyst is creating the first draft of a network diagram for the company ' s new customer-facing payment application that will be hosted by a third-party cloud service

provider.

SY0-701 question answer

SY0-701 question answer

Question # 115

An office wants to install a Wi-Fi network. The security team must ensure a secure design. The access points will be more powerful and use WPA3 with a 16-character randomized key. Which of the following should the security team do next?

A.

Create a heat map of the building perimeter.

B.

Deploy IPSec tunnels from each access point to the controller.

C.

Enable WPA2-PSK with a 24-character randomized key.

D.

Disable SSH administration on all access points.

Question # 116

A site reliability engineer is designing a recovery strategy that requires quick failover to an identical site if the primary facility goes down. Which of the following types of sites should the engineer consider?

A.

Recovery site

B.

Hot site

C.

Cold site

D.

Warm site

Question # 117

A new employee accessed an unauthorized website. An investigation found that the employee violated the company ' s rules. Which of the following did the employee violate?

A.

MOU

B.

AUP

C.

NDA

D.

MOA

Question # 118

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

A.

Encryption

B.

Hashing

C.

Masking

D.

Tokenization

Question # 119

Which of the following mitigation techniques would a security analyst most likely use to avoid bloatware on devices?

A.

Disabled ports/protocols

B.

Application allow list

C.

Default password changes

D.

Access control permissions

Question # 120

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Non-repudiation

Question # 121

While a user reviews their email, a host gets infected by malware from an external hard drive plugged into the host. The malware steals all the user ' s credentials stored in the browser. Which of the following training topics should the user review to prevent this situation from reoccurring?

A.

Operational security

B.

Removable media and cables

C.

Password management

D.

Social engineering

Question # 122

Which of the following is the stage in an investigation when forensic images are obtained?

A.

Acquisition

B.

Preservation

C.

Reporting

D.

E-discovery

Question # 123

Which of the following should a security team do first before a new web server goes live?

A.

Harden the virtual host.

B.

Create WAF rules.

C.

Enable network intrusion detection.

D.

Apply patch management

Question # 124

Which of the following is a primary security concern for a company setting up a BYOD program?

A.

End of life

B.

Buffer overflow

C.

VM escape

D.

Jailbreaking

Question # 125

A small business initially plans to open common communications ports (21, 22, 25, 80, 443) on its firewall to allow broad access to its screened subnet. However, their security consultant advises against this action. Which of the following security principles is the consultant addressing?

A.

Secure access service edge

B.

Attack surface

C.

Least privilege

D.

Separation of duties

Question # 126

An employee clicks a malicious link in an email that appears to be from the company ' s Chief Executive Officer. The employee ' s computer is infected with ransomware that encrypts the company ' s files. Which of the following is the most effective way for the company to prevent similar incidents in the future?

A.

Security awareness training

B.

Database encryption

C.

Segmentation

D.

Reporting suspicious emails

Question # 127

Which of the following should be used to ensure a device is inaccessible to a network-connected resource?

A.

Disablement of unused services

B.

Web application firewall

C.

Host isolation

D.

Network-based IDS

Question # 128

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

A.

To track the status of patch installations

B.

To find shadow IT cloud deployments

C.

To continuously monitor hardware inventory

D.

To hunt for active attackers in the network

Question # 129

An alert references attacks associated with a zero-day exploit. An analyst places a bastion host in the network to reduce the risk of the exploit. Which of the following types of controls is the analyst implementing?

A.

Compensating

B.

Detective

C.

Operational

D.

Physical

Question # 130

An analyst discovers a suspicious item in the SQL server logs. Which of the following could be evidence of an attempted SQL injection?

A.

cat /etc/shadow

B.

dig 25.36.99.11

C.

cd .. / .. / .. /

D.

UserId = 10 OR 1=1;

Question # 131

Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?

A.

ARO

B.

RTO

C.

RPO

D.

ALE

E.

SLE

Question # 132

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

A.

To reduce implementation cost

B.

To identify complexity

C.

To remediate technical debt

D.

To prevent a single point of failure

Question # 133

A company ' s end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

A.

Concurrent session usage

B.

Secure DNS cryptographic downgrade

C.

On-path resource consumption

D.

Reflected denial of service

Question # 134

A company performs a risk assessment on the information security program each year. Which of the following best describes this risk assessment?

A.

Recurring

B.

Ad hoc

C.

One time

D.

Continuous

Question # 135

A bank set up a new server that contains customers ' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?

A.

Full disk encryption

B.

Network access control

C.

File integrity monitoring

D.

User behavior analytics

Question # 136

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

A.

Change management ticketing system

B.

Behavioral analyzer

C.

Collaboration platform

D.

Version control tool

Question # 137

For which of the following reasons would a systems administrator leverage a 3DES hash from an installer file that is posted on a vendor ' s website?

A.

To test the integrity of the file

B.

To validate the authenticity of the file

C.

To activate the license for the file

D.

To calculate the checksum of the file

Question # 138

A security analyst reviews domain activity logs and notices the following:

SY0-701 question answer

Which of the following is the best explanation for what the security analyst has discovered?

A.

The user jsmith ' s account has been locked out.

B.

A keylogger is installed on [smith ' s workstation

C.

An attacker is attempting to brute force ismith ' s account.

D.

Ransomware has been deployed in the domain.

Question # 139

Which of the following is a vulnerability concern for end-of-life hardware?

A.

Failure to follow hardware disposal procedures could result in unintended data release.

B.

The supply chain may not have replacement hardware.

C.

Newly released software may require computing resources not available on legacy hardware.

D.

The vendor may stop providing patches and updates.

Question # 140

Which of the following agreements defines response time, escalation, and performance metrics?

A.

BPA

B.

MOA

C.

NDA

D.

SLA

Question # 141

During a recent log review, an analyst found evidence of successful injection attacks. Which of the following will best address this issue?

A.

Authentication

B.

Secure cookies

C.

Static code analysis

D.

Input validation

Question # 142

Which of the following would best allow a company to prevent access to systems from the Internet?

A.

Containerization

B.

Virtualization

C.

SD-WAN

D.

Air-gapped

Question # 143

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

A.

Implementing a bastion host

B.

Deploying a perimeter network

C.

Installing a WAF

D.

Utilizing single sign-on

Question # 144

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company ' s reliance on open-source libraries?

A.

Buffer overflow

B.

SQL injection

C.

Cross-site scripting

D.

Zero day

Question # 145

Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?

A.

Development

B.

Test

C.

Production

D.

Staging

Question # 146

After failing an audit twice, an organization has been ordered by a government regulatory agency to pay fines. Which of the following caused this action?

A.

Non-compliance

B.

Contract violations

C.

Government sanctions

D.

Rules of engagement

Question # 147

A security analyst wants to automate a task that shares data between systems. Which of the following is the best option for the analyst to use?

A.

SOAR

B.

API

C.

SFTP

D.

RDP

Question # 148

A security engineer would like to enhance the use of automation and orchestration within the SIEM. Which of the following would be the primary benefit of this enhancement?

A.

It increases complexity.

B.

It removes technical debt.

C.

It adds additional guard rails.

D.

It acts as a workforce multiplier.

Question # 149

Two companies are in the process of merging. The companies need to decide how to standardize their information security programs. Which of the following would best align the security programs?

A.

Shared deployment of CIS baselines

B.

Joint cybersecurity best practices

C.

Both companies following the same CSF

D.

Assessment of controls in a vulnerability report

Question # 150

After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?

A.

Bluetooth

B.

Wired

C.

NFC

D.

SCADA

Question # 151

A user needs to complete training at https://comptiatraining.com. After manually entering the URL, the user sees that the accessed website is noticeably different from the standard company website. Which of the following is the most likely explanation for the difference?

A.

Cross-site scripting

B.

Pretexting

C.

Typosquatting

D.

Vishing

Question # 152

Which of the following is the most likely benefit of conducting an internal audit?

A.

Findings are reported to shareholders.

B.

Reports are not formal and can be reassigned.

C.

Control gaps are identified for remediation.

D.

The need for external audits is eliminated.

Question # 153

A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering.

Which of the following teams will conduct this assessment activity?

A.

White

B.

Purple

C.

Blue

D.

Red

Question # 154

The Chief Information Security Officer wants to discuss options for a disaster recovery site that allows the business to resume operations as quickly as possible. Which of the following solutions meets this requirement?

A.

Hot site

B.

Cold site

C.

Geographic dispersion

D.

Warm site

Question # 155

A systems administrator is concerned about vulnerabilities within cloud computing instances Which of the following is most important for the administrator to consider when architecting a cloud computing environment?

A.

SQL injection

B.

TOC/TOU

C.

VM escape

D.

Tokenization

E.

Password spraying

Question # 156

While updating the security awareness training, a security analyst wants to address issues created if vendors ' email accounts are compromised. Which of the following recommendations should the security analyst include in the training?

A.

Refrain from clicking on images included in emails from new vendors.

B.

Delete emails from unknown service provider partners.

C.

Require that invoices be sent as attachments.

D.

Be alert to unexpected requests from familiar email addresses.

Question # 157

During a routine audit, an analyst discovers that a department uses software that was not vetted. Which threat is this?

A.

Espionage

B.

Data exfiltration

C.

Shadow IT

D.

Zero-day

Question # 158

A legal department must maintain a backup from all devices that have been shredded and recycled by a third party. Which of the following best describes this requirement?

A.

Data retention

B.

Certification

C.

Sanitation

D.

Destruction

Question # 159

Which of the following is a qualitative approach to risk analysis?

A.

Including the MTTR and MTBF as part of the risk assessment

B.

Tracking and documenting network risks using a risk register

C.

Assigning a level of high, medium, or low to the risk rating

D.

Using ALE and ARO to help determine whether a risk should be mitigated

Question # 160

An enterprise security team is researching a new security architecture to better protect the company ' s networks and applications against the latest cyberthreats. The company has a fully remote workforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?

A.

IPS

B.

SIEM

C.

SASE

D.

CASB

Question # 161

A security administrator is reissuing a former employee ' s laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

A.

Data retention

B.

Certification

C.

Tokenization

D.

Classification

E.

Sanitization

F.

Enumeration

Question # 162

Which of the following should a systems administrator use to decrease the company ' s hardware attack surface?

A.

Replication

B.

Isolation

C.

Centralization

D.

Virtualization

Question # 163

When trying to access an internal website, an employee reports that a prompt displays, stating that the site is insecure. Which of the following certificate types is the site most likely using?

A.

Wildcard

B.

Root of trust

C.

Third-party

D.

Self-signed

Question # 164

A security report shows that during a two-week test period. 80% of employees unwittingly disclosed their SSO credentials when accessing an external website. The organization purposelycreated the website to simulate a cost-free password complexity test. Which of the following would best help reduce the number of visits to similar websites in the future?

A.

Block all outbound traffic from the intranet.

B.

Introduce a campaign to recognize phishing attempts.

C.

Restrict internet access for the employees who disclosed credentials.

D.

Implement a deny list of websites.

Question # 165

Which of the following is an example of a certificate that is generated by an internal source?

A.

Digital signature

B.

Asymmetric key

C.

Self-signed

D.

Symmetric key

Question # 166

Which of the following is a compensating control for providing user access to a high-risk website?

A.

Enabling threat prevention features on the firewall

B.

Configuring a SIEM tool to capture all web traffic

C.

Setting firewall rules to allow traffic from any port to that destination

D.

Blocking that website on the endpoint protection software

Question # 167

Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client ' s web browser?

A.

SQL injection

B.

Cross-site scripting

C.

Zero-day exploit

D.

On-path attack

Question # 168

A security professional discovers a folder containing an employee ' s personal information on the enterprise ' s shared drive. Which of the following best describes the data type the securityprofessional should use to identify organizational policies and standards concerning the storage of employees ' personal information?

A.

Legal

B.

Financial

C.

Privacy

D.

Intellectual property

Question # 169

An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?

A.

Deploy multifactor authentication.

B.

Decrease the level of the web filter settings

C.

Implement security awareness training.

D.

Update the acceptable use policy

Question # 170

An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the following describes the administrator ' s role?

A.

Processor

B.

Custodian

C.

Privacy officer

D.

Owner

Question # 171

Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?

A.

Physical

B.

Managerial

C.

Technical

D.

Operational

Question # 172

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device ' s drive if the device is lost?

A.

TPM

B.

ECC

C.

FDE

D.

HSM

Question # 173

A group of developers has a shared backup account to access the source code repository. Which of the following is the best way to secure the backup account if there is an SSO failure?

A.

RAS

B.

EAP

C.

SAML

D.

PAM

Question # 174

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

A.

SLA

B.

BPA

C.

NDA

D.

MOA

Question # 175

A systems administrator uses deception techniques to help detect and study attacks within a network. The administrator deploys a document filled with fake passwords and customer payment information. Which of the following techniques is the administrator using?

A.

Honeytoken

B.

Honeypot

C.

Honeyfile

D.

Honeynet

Question # 176

Which of the following would best ensure a controlled version release of a new software application?

A.

Business continuity planning

B.

Quantified risk analysis

C.

Static code analysis

D.

Change management procedures

Question # 177

Which of the following is an example of memory injection?

A.

Two processes access the same variable, allowing one to cause a privilege escalation.

B.

A process receives an unexpected amount of data, which causes malicious code to be executed.

C.

Malicious code is copied to the allocated space of an already running process.

D.

An executable is overwritten on the disk, and malicious code runs the next time it is executed.

Question # 178

Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Select two).

A.

Fencing

B.

Video surveillance

C.

Badge access

D.

Access control vestibule

E.

Sign-in sheet

F.

Sensor

Question # 179

A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?

A.

Capacity planning

B.

Redundancy

C.

Geographic dispersion

D.

Tablet exercise

Question # 180

A security consultant is working with a client that wants to physically isolate its secure systems. Which of the following best describes this architecture?

A.

SDN

B.

Air gapped

C.

Containerized

D.

Highly available

Question # 181

Which of the following would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed?

A.

A full inventory of all hardware and software

B.

Documentation of system classifications

C.

A list of system owners and their departments

D.

Third-party risk assessment documentation

Question # 182

Which of the following best describes the concept of information being stored outside of its country of origin while still being subject to the laws and requirements of the country of origin?

A.

Data sovereignty

B.

Geolocation

C.

Intellectual property

D.

Geographic restrictions

Question # 183

A company ' s website is www. Company. com Attackers purchased the domain wwww. company.com Which of the following types of attacks describes this example?

A.

Typosquatting

B.

Brand Impersonation

C.

On-path

D.

Watering-hole

Question # 184

A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers Which of the following solutions is the organization most likely to employ to further increase performance and availability?

A.

Load balancer

B.

Jump server

C.

Proxy server

D.

SD-WAN

Question # 185

An organization experiences a compromise in a cloud-hosted solution that contains customer information. Which of the following strategies will help determine the sensitivity level of the breach?

A.

Permission restrictions

B.

Tabletop exercise

C.

Data classification

D.

Asset inventory

Question # 186

A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).

A.

SSH

B.

SNMP

C.

RDP

D.

S/MIME

E.

SMTP

F.

SFTP

Question # 187

Which of the following can be used to compromise a system that is running an RTOS?

A.

Cross-site scripting

B.

Memory injection

C.

Replay attack

D.

Ransomware

Question # 188

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

A.

If a security incident occurs on the device, the correct employee can be notified.

B.

The security team will be able to send user awareness training to the appropriate device.

C.

Users can be mapped to their devices when configuring software MFA tokens.

D.

User-based firewall policies can be correctly targeted to the appropriate laptops.

E.

When conducting penetration testing, the security team will be able to target the desired laptops.

F.

Company data can be accounted for when the employee leaves the organization.

Question # 189

Which of the following concepts protects sensitive information from unauthorized disclosure?

A.

Integrity

B.

Availability

C.

Authentication

D.

Confidentiality

Question # 190

A security administrator receives multiple reports about the same suspicious email. Which of the following is the most likely reason for the malicious email ' s continued delivery?

A.

Employees are flagging legitimate emails as spam.

B.

Information from reported emails is not being used to tune email filtering tools.

C.

Employees are using shadow IT solutions for email.

D.

Employees are forwarding personal emails to company email addresses.

Question # 191

A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?

A.

Hashing

B.

Tokenization

C.

Encryption

D.

Segmentation

Question # 192

Which of the following is the most likely to be included as an element of communication in a security awareness program?

A.

Reporting phishing attempts or other suspicious activities

B.

Detecting insider threats using anomalous behavior recognition

C.

Verifying information when modifying wire transfer data

D.

Performing social engineering as part of third-party penetration testing

Question # 193

Which of the following can a security director use to prioritize vulnerability patching within a company ' s IT environment?

A.

SOAR

B.

CVSS

C.

SIEM

D.

CVE

Question # 194

Which of the following exercises should an organization use to improve its incident response process?

A.

Tabletop

B.

Replication

C.

Failover

D.

Recovery

Question # 195

Which of the following should an internal auditor check for first when conducting an audit of the organization ' s risk management program?

A.

Policies and procedures

B.

Asset management

C.

Vulnerability assessment

D.

Business impact analysts

Question # 196

A security analyst estimates that a small security incident will cost $10,000 and will occur twice per year. The analyst recommends a budget of $20,000 for next year. Which of the following does the $10,000 represent?

A.

ARO

B.

SLE

C.

ALE

D.

RPO

Question # 197

A network engineer is increasing the overall security of network devices and needs to harden the devices. Which of the following will best accomplish this task?

A.

Configuring centralized logging

B.

Generating local administrator accounts

C.

Replacing Telnet with SSH

D.

Enabling HTTP administration

Question # 198

Which of the following teams combines both offensive and defensive testing techniques to protect an organization ' s critical systems?

A.

Red

B.

Blue

C.

Purple

D.

Yellow

Question # 199

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

Question # 200

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

A.

The device has been moved from a production environment to a test environment.

B.

The device is configured to use cleartext passwords.

C.

The device is moved to an isolated segment on the enterprise network.

D.

The device is moved to a different location in the enterprise.

E.

The device ' s encryption level cannot meet organizational standards.

F.

The device is unable to receive authorized updates.

Question # 201

Which of the following allows an exploit to go undetected by the operating system?

A.

Firmware vulnerabilities

B.

Side loading

C.

Memory injection

D.

Encrypted payloads

Question # 202

The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

A.

Hot site

B.

Cold site

C.

Failover site

D.

Warm site

Question # 203

A user sends an email that includes a digital signature for validation. Which of the following security concepts would ensure that a user cannot deny that they sent the email?

A.

Non-repudiation

B.

Confidentiality

C.

Integrity

D.

Authentication

Question # 204

An IT team rolls out a new management application that uses a randomly generated MFA token sent to the administrator’s phone. Despite this new MFA precaution, there is a security breach of the same software. Which of the following describes this kind of attack?

A.

Smishing

B.

Typosquatting

C.

Espionage

D.

Pretexting

Question # 205

Which of the following would most likely prevent exploitation of an end-of-life, business-critical system?

A.

Monitoring

B.

Isolation

C.

Decommissioning

D.

Encryption

Question # 206

Which of the following should be used to prevent changes to system-level data?

A.

NIDS

B.

DLP

C.

NAC

D.

FIM

Question # 207

A security analyst scans a company ' s public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

A.

Changing the remote desktop port to a non-standard number

B.

Setting up a VPN and placing the jump server inside the firewall

C.

Using a proxy for web connections from the remote desktop server

D.

Connecting the remote server to the domain and increasing the password length

Question # 208

A systems administrator notices that one of the systems critical for processing customer transactions is running an end-of-life operating system. Which of the following techniques would increase enterprise security?

A.

Installing HIDS on the system

B.

Placing the system in an isolated VLAN

C.

Decommissioning the system

D.

Encrypting the system ' s hard drive

Question # 209

A penetration tester was able to gain unauthorized access to a hypervisor platform. Which of the following vulnerabilities was most likely exploited?

A.

Cross-site scripting

B.

SQL injection

C.

Race condition

D.

VM escape

Question # 210

Which of the following should an organization focus on the most when making decisions about vulnerability prioritization?

A.

Exposure factor

B.

CVSS

C.

CVE

D.

Industry impact

Question # 211

Which of the following cryptographic methods is preferred for securing communications with limited computing resources?

A.

Hashing algorithm

B.

Public key infrastructure

C.

Symmetric encryption

D.

Elliptic curve cryptography

Question # 212

An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?

A.

If the wildcard certificate is configured

B.

If the certificate signing request is valid

C.

If the root certificate is installed

D.

If the public key is configured

Question # 213

Which of the following hardening techniques must be applied on a container image before deploying it to a production environment? (Select two).

A.

Remove default applications.

B.

Install a NIPS.

C.

Disable Telnet.

D.

Reconfigure the DNS

E.

Add an SFTP server.

F.

Delete the public certificate.

Question # 214

A few weeks after deploying additional email servers, a company begins to receive complaints that messages are going into recipients’ spam folders. Which of the following needs to be updated?

A.

CNAME

B.

SMTP

C.

DLP

D.

SPF

Question # 215

A security engineer is implementing FDE for all laptops in an organization. Which of the following are the most important for the engineer to consider as part of the planning process? (Select two).

A.

Key escrow

B.

TPM presence

C.

Digital signatures

D.

Data tokenization

E.

Public key management

F.

Certificate authority linking

Question # 216

The Cruel Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells me analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?

A.

Log in to the server and perform a health check on the VM.

B.

Install the patch Immediately.

C.

Confirm that the backup service is running.

D.

Take a snapshot of the VM.

Question # 217

A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?

A.

Threshold

B.

Appetite

C.

Tolerance

D.

Register

Question # 218

Which of the following is best used to detect fraud by assigning employees to different roles?

A.

Least privilege

B.

Mandatory vacation

C.

Separation of duties

D.

Job rotation

Question # 219

Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?

A.

Risk mitigation

B.

Risk identification

C.

Risk treatment

D.

Risk monitoring and review

Question # 220

An employee asks a security analyst to scan a suspicious email that contains a link to a file on a file-sharing site. The analyst determines that the file is safe after downloading and scanning the file with antivirus software. When the employee opens the file, their device is infected with ransomware. Which of the following steps should the analyst have taken?

A.

Review the file in a code editor.

B.

Monitor the file connections with netstat -ano.

C.

Execute the file in a sandbox.

D.

Retrieve the file hash and check with OSINT.

Question # 221

A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?

A.

Open-source intelligence

B.

Bug bounty

C.

Red team

D.

Penetration testing

Question # 222

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

A.

Packet captures

B.

Vulnerability scans

C.

Metadata

D.

Dashboard

Question # 223

A database administrator is updating the company ' s SQL database, which stores credit card information for pending purchases. Which of the following is the best method to secure the data against a potential breach?

A.

Hashing

B.

Obfuscation

C.

Tokenization

D.

Masking

Question # 224

A business needs a recovery site but does not require immediate failover. The business also wants to reduce the workload required to recover from an outage. Which of the following recovery sites is the best option?

A.

Hot

B.

Cold

C.

Warm

D.

Geographically dispersed

Question # 225

A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).

A.

Physical

B.

Managerial

C.

Detective

D.

Administrator

E.

Preventative

F.

Technical

Question # 226

Which of the following actions is best performed by ticketing automation to ensure that incidents receive the correct level of attention and response?

A.

Notification

B.

Creation

C.

Closure

D.

Escalation

Question # 227

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

A.

Key stretching

B.

Tokenization

C.

Data masking

D.

Salting

Question # 228

A customer of a large company receives a phone call from someone claiming to work for the company and asking for the customer ' s credit card information. The customer sees the caller ID is the same as the company ' s main phone number. Which of the following attacks is the customer most likely a target of?

A.

Phishing

B.

Whaling

C.

Smishing

D.

Vishing

Question # 229

An organization conducts a self-evaluation with a phishing campaign that requests login credentials. The organization receives the following results:

• None of the staff were fooled by the attempt due to proper security awareness.

• Staff deleted the email without performing any additional actions.

Which of the following security practices would add the most value to the organization?

A.

Implement a strict password reset policy for all senior managers after a security event.

B.

Update user guidance to include suspicious incident reporting.

C.

Conduct end-user training regarding spear-phishing attempts to raise awareness.

D.

Require remote workers to use a VPN when connecting to the organization ' s networks.

Question # 230

A company wants to protect a specialized legacy platform that controls the physical flow of gas inside of pipes. Which of the following environments does the company need to secure to best achieve this goal?

A.

IaaS

B.

SCADA

C.

SDN

D.

IoT

Question # 231

A security analyst is assessing several company firewalls. Which of the following cools would The analyst most likely use to generate custom packets to use during the assessment?

A.

hping

B.

Wireshark

C.

PowerShell

D.

netstat

Question # 232

A company is redesigning its infrastructure and wants to reduce the number of physical servers in use. Which of the following architectures is best suited for this goal?

A.

Isolation

B.

Segmentation

C.

Virtualization

D.

Redundancy

Question # 233

A business provides long-term cold storage services to banks that are required to follow regulator-imposed data retention guidelines. Banks that use these services require that data is disposed of in a specific manner at the conclusion of the regulatory threshold for data retention. Which of the following aspects of data management is the most important to the bank in the destruction of this data?

A.

Encryption

B.

Classification

C.

Certification

D.

Procurement

Question # 234

An employee decides to collect PII data from the company ' s system for personal use. The employee compresses the data into a single encrypted file before sending the file to their personal email. The security department becomes aware of the attempted misuse and blocks the attachment from leaving the corporate environment. Which of the following types of employee training would most likely reduce the occurrence of this type of issue?

(Select two).

A.

Privacy legislation

B.

Social engineering

C.

Risk management

D.

Company compliance

E.

Phishing

F.

Remote work

Question # 235

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

A.

Implementing encryption

B.

Monitoring outbound traffic

C.

Using default settings

D.

Closing all open ports

Question # 236

A security officer observes that a software development team is not complying with its corporate security policy on encrypting confidential data. Which of the following categories refers to this type of non-compliance?

A.

External

B.

Standard

C.

Regulation

D.

Internal

Question # 237

A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?

A.

Digital rights management

B.

Role-based access control

C.

Time-based access control

D.

Network access control

Question # 238

Which of the following is a hardware-specific vulnerability?

A.

Firmware version

B.

Buffer overflow

C.

SQL injection

D.

Cross-site scripting

Question # 239

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?

A.

Group Policy

B.

Content filtering

C.

Data loss prevention

D.

Access control lists

Question # 240

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.

Which of the following is the most important consideration during development?

A.

Scalability

B.

Availability

C.

Cost

D.

Ease of deployment

Question # 241

Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?

A.

Deploy a SIEM solution

B.

Create custom scripts to aggregate and analyze logs

C.

Implement EDR technology

D.

Install a unified threat management appliance

Question # 242

A business is expanding to a new country and must protect customers from accidental disclosure of specific national identity information. Which of the following should the security engineer update to best meet business requirements?

A.

SIEM

B.

SCAP

C.

DLP

D.

WAF

SY0-701 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SY0-701 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA Security+ Exam 2026
  • Last Update: Apr 6, 2026
  • Questions and Answers: 814
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SY0-701 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included