CompTIA SY0-701 Practice Exams
Last updated on Apr 01,2025- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Apr 01,2025
An employee in the accounting department receives an email containing a demand for payment tot services performed by a vendor However, the vendor is not in the vendor management database.
Which of the following in this scenario an example of?
- A . Pretexting
- B . Impersonation
- C . Ransomware
- D . Invoice scam
A security administrator is deploying a DLP solution to prevent the exfiltration of sensitive customer data.
Which of the following should the administrator do first?
- A . Block access to cloud storage websites.
- B . Create a rule to block outgoing email attachments.
- C . Apply classifications to the data.
- D . Remove all user permissions from shares on the file server.
Which of the following allows a systems administrator to tune permissions for a file?
- A . Patching
- B . Access control list
- C . Configuration enforcement
- D . Least privilege
Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule.
Which of the following but describes this form of security control?
- A . Physical
- B . Managerial
- C . Technical
- D . Operational
Which of the following would be the most appropriate way to protect data in transit?
- A . SHA-256
- B . SSL 3.0
- C . TLS 1.3
- D . AES-256
During a penetration test, a vendor attempts to enter an unauthorized area using an access badge.
Which of the following types of tests does this represent?
- A . Defensive
- B . Passive
- C . Offensive
- D . Physical
An administrator is Investigating an incident and discovers several users’ computers were Infected with malware after viewing files mat were shared with them. The administrator discovers no degraded performance in the infected machines and an examination of the log files does not show excessive failed logins.
Which of the following attacks Is most likely the cause of the malware?
- A . Malicious flash drive
- B . Remote access Trojan
- C . Brute-forced password
- D . Cryptojacking
A network administrator deployed a DNS logging tool that togs suspicious websites that are visited and then sends a daily report based on various weighted metrics.
Which of the following best describes the type of control the administrator put in place?
- A . Preventive
- B . Deterrent
- C . Corrective
- D . Detective
Which of the following would be the greatest concern for a company that is aware of the consequences of non-compliance with government regulations?
- A . Right to be forgotten
- B . Sanctions
- C . External compliance reporting
- D . Attestation
A company is implementing a vendor’s security tool in the cloud. The security director does not want to manage users and passwords specific to this tool but would rather utilize the company’s standard user directory.
Which of the following should the company implement?
- A . 802.1X
- B . SAML
- C . RADIUS
- D . CHAP