Exam Details

  • Exam Code
    :SY0-701
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :700 Q&As
  • Last Updated
    :Mar 24, 2025

CompTIA CompTIA Certifications SY0-701 Questions & Answers

  • Question 21:

    A security analyst discovers that a large number of employee credentials had been stolen and were being sold on the dark web. The analyst investigates and discovers that some hourly employee credentials were compromised, but salaried employee credentials were not affected.

    Most employees clocked in and out while they were inside the building using one of the kiosks connected to the network. However, some clocked out and recorded their time after leaving to go home. Only those who clocked in and out while inside the building had credentials stolen. Each of the kiosks are on different floors, and there are multiple routers, since the business segments environments for certain business functions.

    Hourly employees are required to use a website called acmetimekeeping.com to clock in and out. This website is accessible from the internet. Which of the following is the most likely reason for this compromise?

    A. A brute-force attack was used against the time-keeping website to scan for common passwords.

    B. A malicious actor compromised the time-keeping website with malicious code using an unpatched vulnerability on the site, stealing the credentials.

    C. The internal DNS servers were poisoned and were redirecting acmetimekeeping.com to a malicious domain that intercepted the credentials and then passed them through to the real site.

    D. ARP poisoning affected the machines in the building and caused the kiosks to send a copy of all the submitted credentials to a malicious machine.

  • Question 22:

    A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?

    A. SOAR

    B. SIEM

    C. MDM

    D. DLP

  • Question 23:

    A manager receives an email that contains a link to receive a refund. After hovering over the link, the manager notices that the domain's URL points to a suspicious link. Which of the following security practices helped the manager to identify the attack?

    A. End user training

    B. Policy review

    C. URL scanning

    D. Plain text email

  • Question 24:

    Which of the following is the most important security concern when using legacy systems to provide production service?

    A. Instability

    B. Lack of vendor support

    C. Loss of availability

    D. Use of insecure protocols

  • Question 25:

    Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

    A. Availability

    B. Non-repudiation

    C. Integrity

    D. Confidentiality

  • Question 26:

    A recent penetration test identified that an attacker could flood the MAC address table of network switches. Which of the following would best mitigate this type of attack?

    A. Load balancer

    B. Port security

    C. IPS

    D. NGFW

  • Question 27:

    Which of the following is the most effective way to protect an application server running software that is no longer supported from network threats?

    A. Air gap

    B. Barricade

    C. Port security

    D. Screen subnet

  • Question 28:

    The Chief Information Security Officer of an organization needs to ensure recovery from ransomware would likely occur within the organization's agreed-upon RPOs end RTOs. Which of the following backup scenarios would best ensure recovery?

    A. Hourly differential backups stored on a local SAN array

    B. Dally full backups stored on premises in magnetic offline media

    C. Daly differential backups maintained by a third-party cloud provider

    D. Weekly full backups with daily incremental stored on a NAS drive

  • Question 29:

    Which of the following enables the use of an input field to run commands that can view or manipulate data?

    A. Cross-site scripting

    B. Side loading

    C. Buffer overflow

    D. SQL injection

  • Question 30:

    Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?

    A. SLA

    B. MOU

    C. MOA

    D. BPA

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-701 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.