Certbus > CompTIA > CompTIA Certifications > SY0-701 > SY0-701 Online Practice Questions and Answers

SY0-701 Online Practice Questions and Answers

Questions 4

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

A. Compromise

B. Retention

C. Analysis

D. Transfer

E. Inventory

Browse 700 Q&As
Questions 5

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

A. VM escape

B. SQL injection

C. Buffer overflow

D. Race condition

Browse 700 Q&As
Questions 6

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

A. The device has been moved from a production environment to a test environment.

B. The device is configured to use cleartext passwords.

C. The device is moved to an isolated segment on the enterprise network.

D. The device is moved to a different location in the enterprise.

E. The device's encryption level cannot meet organizational standards.

F. The device is unable to receive authorized updates.

Browse 700 Q&As
Questions 7

An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?

A. Perform a mathematical operation on the passwords that will convert them into umgue stnngs

B. Add extra data to the passwords so their length is increased, making them harder to brute force

C. Store all passwords in the system in a rainbow table that has a centralized location

D. Enforce the use of one-time passwords that are changed for every login session.

Browse 700 Q&As
Questions 8

Which of the following best ensures minimal downtime and data loss for organizations with critical computing equipment located in earthquake-prone areas?

A. Generators and UPS

B. Off-site replication

C. Redundant cold sites

D. High availability networking

Browse 700 Q&As
Questions 9

In order to strengthen a password and prevent a hacker from cracking it, a random string of 36 characters was added to the password. Which of the following best describes this technique?

A. Key stretching

B. Tokenization

C. Data masking

D. Salting

Browse 700 Q&As
Questions 10

Which of the following threat actors is the most likely to be motivated by profit?

A. Hacktivist

B. Insider threat

C. Organized crime

D. Shadow IT

Browse 700 Q&As
Questions 11

A systems administrator is auditing all company servers to ensure they meet the minimum security baseline. While auditing a Linux server, the systems administrator observes the /etc/shadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

A. chmod

B. grep

C. dd

D. passwd

Browse 700 Q&As
Questions 12

A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?

A. Business email

B. Social engineering

C. Unsecured network

D. Default credentials

Browse 700 Q&As
Questions 13

An administrator needs to perform server hardening before deployment. Which of the following steps should the administrator take? (Select two).

A. Disable default accounts.

B. Add the server to the asset inventory.

C. Remove unnecessary services.

D. Document default passwords.

E. Send server logs to the SIEM.

F. Join the server to the corporate domain.

Browse 700 Q&As
Questions 14

Which of the following describes an executive team that is meeting in a board room and testing the company's incident response plan?

A. Continuity of operations

B. Capacity planning

C. Tabletop exercise

D. Parallel processing

Browse 700 Q&As
Questions 15

Two companies are in the process of merging. The companies need to decide how to standardize their information security programs. Which of the following would best align the security programs?

A. Shared deployment of CIS baselines

B. Joint cybersecurity best practices

C. Both companies following the same CSF

D. Assessment of controls in a vulnerability report

Browse 700 Q&As
Questions 16

The Cruel Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells me analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?

A. Log in to the server and perform a health check on the VM.

B. Install the patch Immediately.

C. Confirm that the backup service is running.

D. Take a snapshot of the VM.

Browse 700 Q&As
Questions 17

A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker accessed a blocked sue from a work computer and reported the issue. While investigating the issue, a security administrator found another device providing internet access to certain employees. Which of the following best describes the security risk?

A. The host-based security agent Is not running on all computers.

B. A rogue access point Is allowing users to bypass controls.

C. Employees who have certain credentials are using a hidden SSID.

D. A valid access point is being jammed to limit availability.

Browse 700 Q&As
Questions 18

A website user is locked out of an account after clicking an email link and visiting a different website. Web server logs show the user's password was changed, even though the user did not change the password. Which of the following is the most likely cause?

A. Cross-sue request forgery

B. Directory traversal

C. ARP poisoning

D. SQL injection

Browse 700 Q&As
Exam Code: SY0-701
Exam Name: CompTIA Security+
Last Update: Mar 16, 2025
Questions: 700 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99