CompTIA SY0-701 Practice Exams
Last updated on Apr 07,2025- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Apr 07,2025
Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?
- A . IDS
- B . ACL
- C . EDR
- D . NAC
Which of the following must be considered when designing a high-availability network? (Choose two).
- A . Ease of recovery
- B . Ability to patch
- C . Physical isolation
- D . Responsiveness
- E . Attack surface
- F . Extensible authentication
A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company.
Which of the following attack vectors is most likely being used?
- A . Business email
- B . Social engineering
- C . Unsecured network
- D . Default credentials
Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
- A . Authorization
- B . Identification
- C . Non-repudiation
- D . Authentication
A security analyst is creating base for the server team to follow when hardening new devices for deployment.
Which of the following beet describes what the analyst is creating?
- A . Change management procedure
- B . Information security policy
- C . Cybersecurity framework
- D . Secure configuration guide
Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?
- A . To track the status of patch installations
- B . To find shadow IT cloud deployments
- C . To continuously monitor hardware inventory
- D . To hunt for active attackers in the network
A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added.
Which of the following would be the best solution to meet these objectives?
- A . Load balancing
- B . Fault tolerance
- C . Proxy servers
- D . Replication
Which of the following threat vectors is most commonly utilized by insider threat actors attempting
data exfiltration?
- A . Unidentified removable devices
- B . Default network device credentials
- C . Spear phishing emails
- D . Impersonation of business units through typosquatting
Which of the following teams combines both offensive and defensive testing techniques to protect an organization’s critical systems?
- A . Red
- B . Blue
- C . Purple
- D . Yellow
A security analyst is creating base for the server team to follow when hardening new devices for deployment.
Which of the following beet describes what the analyst is creating?
- A . Change management procedure
- B . Information security policy
- C . Cybersecurity framework
- D . Secure configuration guide