SY0-701 CompTIA Security+ Exam 2024 Dumps

If you are looking for free SY0-701 dumps than here we have some sample question answers available. You can prepare from our CompTIA SY0-701 exam questions notes and prepare exam with this practice test. Check below our updated SY0-701 exam dumps.

DumpsGroup are top class study material providers and our inclusive range of SY0-701 Real exam questions would be your key to success in CompTIA CompTIA Security+ Certification Exam in just first attempt. We have an excellent material covering almost all the topics of CompTIA SY0-701 exam. You can get this material in CompTIA SY0-701 PDF and SY0-701 practice test engine formats designed similar to the Real Exam Questions. Free SY0-701 questions answers and free CompTIA SY0-701 study material is available here to get an idea about the quality and accuracy of our study material.


discount banner

Sample Question 4

Which of the following incident response activities ensures evidence is properly handied?

A. E-discovery
B. Chain of custody
C. Legal hold
D. Preservation


Sample Question 5

Which of the following would help ensure a security analyst is able to accurately measurethe overall risk to an organization when a new vulnerability is disclosed?

A. A full inventory of all hardware and software
B. Documentation of system classifications
C. A list of system owners and their departments
D. Third-party risk assessment documentation


Sample Question 6

A company must ensure sensitive data at rest is rendered unreadable. Which of thefollowing will the company most likely use?

A. Hashing
B. Tokenization
C. Encryption
D. Segmentation


Sample Question 7

Visitors to a secured facility are required to check in with a photo ID and enter the facilitythrough an access control vestibule Which of the following but describes this form ofsecurity control?

A. Physical
B. Managerial
C. Technical
D. Operational


Sample Question 8

A security analyst receives alerts about an internal system sending a large amount ofunusual DNS queries to systems on the internet over short periods of time during nonbusinesshours. Which of the following is most likely occurring?

A. A worm is propagating across the network.
B. Data is being exfiltrated.
C. A logic bomb is deleting data.
D. Ransomware is encrypting files.


Sample Question 9

A company is planning a disaster recovery site and needs to ensure that a single naturaldisaster would not result in the complete loss of regulated backup data. Which of thefollowing should the company consider?

A. Geographic dispersion
B. Platform diversity
C. Hot site
D. Load balancing


Sample Question 10

A company is working with a vendor to perform a penetration test Which of the followingincludes an estimate about the number of hours required to complete the engagement?

A. SOW
B. BPA
C. SLA
D. NDA


Sample Question 11

Which of the following teams combines both offensive and defensive testing techniques toprotect an organization's critical systems?

A. Red
B. Blue
C. Purple
D. Yellow


Sample Question 12

Which of the following describes the maximum allowance of accepted risk?

A. Risk indicator
B. Risk level
C. Risk score
D. Risk threshold


Sample Question 13

The local administrator account for a company's VPN appliance was unexpectedly used tolog in to the remote management interface. Which of the following would have most likelyprevented this from happening'?

A. Using least privilege
B. Changing the default password
C. Assigning individual user IDs
D. Reviewing logs more frequently


Sample Question 14

A systems administrator is changing the password policy within an enterprise environmentand wants this update implemented on all systems as quickly as possible. Which of thefollowing operating system security measures will the administrator most likely use?

A. Deploying PowerShell scripts
B. Pushing GPO update
C. Enabling PAP
D. Updating EDR profiles


Sample Question 15

An employee receives a text message from an unknown number claiming to be thecompany's Chief Executive Officer and asking the employee to purchase several gift cards.Which of the following types of attacks does this describe?

A. Vishing
B. Smishing
C. Pretexting
D. Phishing


Sample Question 16

A systems administrator set up a perimeter firewall but continues to notice suspiciousconnections between internal endpoints. Which of the following should be set up in order tomitigate the threat posed by the suspicious activity?

A. Host-based firewall
B. Web application firewall
C. Access control list
D. Application allow listc


Sample Question 17

A company is developing a critical system for the government and storing projectinformation on a fileshare. Which of the following describes how this data will most likely beclassified? (Select two).

A. Private
B. Confidential
C. Public
D. Operational
E. Urgent
F. Restricted


Sample Question 18

A network manager wants to protect the company's VPN by implementing multifactorauthentication that uses:. Something you know. Something you have. Something you areWhich of the following would accomplish the manager's goal?

A. Domain name, PKI, GeolP lookup
B. VPN IP address, company ID, facial structure
C. Password, authentication token, thumbprint
D. Company URL, TLS certificate, home address


Sample Question 19

After a recent ransomware attack on a company's system, an administrator reviewed thelog files. Which of the following control types did the administrator use?

A. Compensating
B. Detective
C. Preventive
D. Corrective


Sample Question 20

A user is attempting to patch a critical system, but the patch fails to transfer. Which of thefollowing access controls is most likely inhibiting the transfer?

A. Attribute-based
B. Time of day
C. Role-based
D. Least privilege


Sample Question 21

An administrator finds that all user workstations and servers are displaying a message thatis associated with files containing an extension of .ryk. Which of the following types ofinfections is present on the systems?

A. Virus
B. Trojan
C. Spyware
D. Ransomware


Sample Question 22

After reviewing the following vulnerability scanning report:Server:192.168.14.6Service: TelnetPort: 23 Protocol: TCPStatus: Open Severity: HighVulnerability: Use of an insecure network protocolA security analyst performs the following test:nmap -p 23 192.168.14.6 —script telnet-encryptionPORT STATE SERVICE REASON23/tcp open telnet syn-ackI telnet encryption:| _ Telnet server supports encryptionWhich of the following would the security analyst conclude for this reported vulnerability?

A. It is a false positive.
B. A rescan is required.
C. It is considered noise.
D. Compensating controls exist.


Sample Question 23

An organization would like to store customer data on a separate part of the network that isnot accessible to users on the main corporate network. Which of the following should theadministrator use to accomplish this goal?

A. Segmentation
B. Isolation
C. Patching
D. Encryption


Sample Question 24

An organization is struggling with scaling issues on its VPN concentrator and internet circuitdue to remote work. The organization is looking for a software solution that will allow it toreduce traffic on the VPN and internet circuit, while still providing encrypted tunnel accessto the data center and monitoring of remote employee internet traffic. Which of the followingwill help achieve these objectives?

A. Deploying a SASE solution to remote employees
B. Building a load-balanced VPN solution with redundant internet
C. Purchasing a low-cost SD-WAN solution for VPN traffic
D. Using a cloud provider to create additional VPN concentrators


Sample Question 25

A company's end users are reporting that they are unable to reach external websites. Afterreviewing the performance data for the DNS severs, the analyst discovers that the CPU,disk, and memory usage are minimal, but the network interface is flooded with inboundtraffic. Network logs show only a small number of DNS queries sent to this server. Which ofthe following best describes what the security analyst is seeing?

A. Concurrent session usage
B. Secure DNS cryptographic downgrade
C. On-path resource consumption
D. Reflected denial of service


Sample Question 26

Which of the following security concepts is the best reason for permissions on a humanresources fileshare to follow the principle of least privilege?

A. Integrity
B. Availability
C. Confidentiality
D. Non-repudiation


Sample Question 27

Which of the following is the most common data loss path for an air-gapped network?

A. Bastion host
B. Unsecured Bluetooth
C. Unpatched OS
D. Removable devices


Sample Question 28

An administrator discovers that some files on a database server were recently encrypted.The administrator sees from the security logs that the data was last accessed by a domainuser. Which of the following best describes the type of attack that occurred?

A. Insider threat
B. Social engineering
C. Watering-hole
D. Unauthorized attacker


Sample Question 29

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

A. Data in use
B. Data in transit
C. Geographic restrictions
D. Data sovereignty



Exam Code: SY0-701
Exam Name: CompTIA Security+ Exam 2024
Last Update: May 03, 2024
Questions: 175