Exam Details

  • Exam Code
    :SY0-701
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :718 Q&As
  • Last Updated
    :Apr 11, 2025

CompTIA CompTIA Certifications SY0-701 Questions & Answers

  • Question 251:

    A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

    A. Accept

    B. Transfer

    C. Mitigate

    D. Avoid

  • Question 252:

    After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?

    A. Console access

    B. Routing protocols

    C. VLANs

    D. Web-based administration

  • Question 253:

    Which of the following scenarios describes a possible business email compromise attack?

    A. An employee receives a gift card request in an email that has an executive's name in the display field of the email.

    B. Employees who open an email attachment receive messages demanding payment in order to access files.

    C. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.

    D. An employee receives an email with a link to a phishing site that is designed to look like the company's email portal.

  • Question 254:

    Which of the following practices would be best to prevent an insider from introducing malicious code into a company's development process?

    A. Code scanning for vulnerabilities

    B. Open-source component usage

    C. Quality assurance testing

    D. Peer review and approval

  • Question 255:

    A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?

    A. Secure cookies

    B. Version control

    C. Input validation

    D. Code signing

  • Question 256:

    A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

    A. Concurrent session usage

    B. Secure DNS cryptographic downgrade

    C. On-path resource consumption

    D. Reflected denial of service

  • Question 257:

    Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked.

    Which of the following changes would allow users to access the site?

    A. Creating a firewall rule to allow HTTPS traffic

    B. Configuring the IPS to allow shopping

    C. Tuning the DLP rule that detects credit card data

    D. Updating the categorization in the content filter

  • Question 258:

    Which of the following would be the best way to block unknown programs from executing?

    A. Access control list

    B. Application allow list.

    C. Host-based firewall

    D. DLP solution

  • Question 259:

    An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?

    A. Hardening

    B. Employee monitoring

    C. Configuration enforcement

    D. Least privilege

  • Question 260:

    A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?

    A. Local data protection regulations

    B. Risks from hackers residing in other countries

    C. Impacts to existing contractual obligations

    D. Time zone differences in log correlation

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-701 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.