Exam Details

  • Exam Code
    :SY0-701
  • Exam Name
    :CompTIA Security+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :718 Q&As
  • Last Updated
    :Apr 03, 2025

CompTIA CompTIA Certifications SY0-701 Questions & Answers

  • Question 301:

    After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?

    A. Retain the emails between the security team and affected customers for 30 days.

    B. Retain any communications related to the security breach until further notice.

    C. Retain any communications between security members during the breach response.

    D. Retain all emails from the company to affected customers for an indefinite period of time.

  • Question 302:

    Which of the following is required for an organization to properly manage its restore process in the event of system failure?

    A. IRP

    B. DRP

    C. RPO

    D. SDLC

  • Question 303:

    While troubleshooting a firewall configuration, a technician determines that a "deny any" policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable.

    Which of the following actions would prevent this issue?

    A. Documenting the new policy in a change request and submitting the request to change management

    B. Testing the policy in a non-production environment before enabling the policy in the production network

    C. Disabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy

    D. Including an 'allow any1 policy above the 'deny any* policy

  • Question 304:

    A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data. Which of the following should the administrator do first?

    A. Block access to cloud storage websites.

    B. Create a rule to block outgoing email attachments.

    C. Apply classifications to the data.

    D. Remove all user permissions from shares on the file server.

  • Question 305:

    A Chief Information Security Officer wants to monitor the company's servers for SQLi attacks and allow for comprehensive investigations if an attack occurs. The company uses SSL decryption to allow traffic monitoring. Which of the following strategies would best accomplish this goal?

    A. Logging all NetFlow traffic into a SIEM

    B. Deploying network traffic sensors on the same subnet as the servers

    C. Logging endpoint and OS-specific security logs

    D. Enabling full packet capture for traffic entering and exiting the servers

  • Question 306:

    The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?

    A. Shadow IT

    B. Insider threat

    C. Data exfiltration

    D. Service disruption

  • Question 307:

    An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device. Which of the following best describes the user's activity?

    A. Penetration testing

    B. Phishing campaign

    C. External audit

    D. Insider threat

  • Question 308:

    A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?

    A. Air gap the system.

    B. Move the system to a different network segment.

    C. Create a change control request.

    D. Apply the patch to the system.

  • Question 309:

    A company's web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?

    A. encryption=off\

    B. http://

    C. www.*.com

    D. :443

  • Question 310:

    A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?

    A. Enumeration

    B. Sanitization

    C. Destruction

    D. Inventory

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SY0-701 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.