Certification Practice Test Sample Questions For CompTIA Security+ (SYO-701)

QuickStart is now offering sample questions for CompTIA Security+ SY0-701. Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA Security+ SY0-701 exam.


 
 
Arrow

CompTIA Security+ Certification Course + Exam Bundle

Enroll now today and get 30% off using discount code PRACTICE30 at checkout.

 
 
proceed to the next question. Correct answers will be displayed when you complete exam.

CompTIA Security+ (SYO-701) Sample Exam Questions

1

One of your systems has been infiltrated and a malicious actor has direct access. Which option would be the best to follow initially?

A. Segmentation
Incorrect.
B. Isolation
Correct!
C. Disconnection
Incorrect.
D. Quarantine
Incorrect.
2

There are multiple wireless encryption methods used today. Which option would be the least recommended for any enterprise-level use?

A. Open
Correct!
B. WPS
Incorrect.
C. WEP
Incorrect.
D. WPA
Incorrect.
3

In an organization, users are allowed to use company-issued tablets to access the network, with the permission to install only approved apps on the devices. What MDM feature would provide functionality meeting this requirement?

A. Application control
Incorrect.
B. Inventory control
Incorrect.
C. Asset tracking
Incorrect.
D. Inventory control
Correct!
4

In a company users are now allowed to user mobile devices on the company network. A screen appears when users are connected to the company Wi-Fi, defining terms of use, and users have to click to acknowledge the agreement. The user is only allowed to connect to the network If he agrees to the terms by clicking Yes. This is an example of what?

A. User acceptance
Incorrect.
B. Acceptable use policy
Correct!
C. Authentication
Incorrect.
D. End user license agreement
Incorrect.
5

What works as a neutral zone, separating public-facing servers from sensitive internal network resources?

A. Demilitarized Zone
Incorrect.
B. Screen Subnet
Correct!
C. Firewall Rule
Incorrect.
D. HoneyPot
Incorrect.
6

Which of the following is not related to time-based restrictions? (opt any two)

A. Network/Logical Location
Correct!
B. Logon Hours
Incorrect.
C. Temporary Permissions
Incorrect.
D. Logon Duration
Incorrect.
7

Some gaps have been highlighted upon completing a security audit of a company. Recommendations from the report suggest upgrading some network components. The following requirements have been provided by the company: * A security device must be implemented consolidating various functions to protect the network, malicious websites to be filtered, and SPAM messages to be stopped. * Implement A tool using real-time and historical analysis to be implemented to identify malware and security incidents. Which of the following set of devices and tools is BEST suited for that purpose?

A. Firewall with STEM
Incorrect.
B. IPS with STEM
Incorrect.
C. UTM with STEM
Correct!
D. Firewall with Syslog
Incorrect.
8

a friend of yours on a social network sends you a direct message telling you about a scheme offering a $100 gift card if you are one of the first 25 to respond to a survey. Upon clicking the link, you realize a malware has infected your machine. Identify the two attack principles you think have contributed to the effectiveness of this attack? (opt any two)

A. Authority
Incorrect.
B. Trust
Correct!
C. Scarcity
Correct!
D. Intimidation
Incorrect.
9

When referencing the CIA Triad which component is related to data that is stored and transferred as intended and any modification is authorized?

A. Availability
Incorrect.
B. Non-repudiation
Incorrect.
C. Confidentiality
Incorrect.
D. Integrity
Correct!
10

Which layer of the OSI Model is related to validating protocol and matching threat signatures with firewall configurations?

A. Layer 4
Incorrect.
B. Layer 7
Correct!
C. Layer 6
Incorrect.
D. Layer 2
Incorrect.
11

Which item is not included in the steps that make up the Impact portion of the analysis process?

A. Threat Intelligence
Correct!
B. Scope
Incorrect.
C. Detection Time/Recovery Time
Incorrect.
D. Economic/Publicity
Incorrect.
12

An organization gets to know that it has been several months since it is under attack from an APT. Identify which type of attack was used for initial breach?

A. Brute force
Incorrect.
B. Watering hole
Incorrect.
C. Tailgating
Incorrect.
D. Spear phishing.
Correct!
13

Data types are extremely important when categorizing data and establishing a security plan. Which data type would be related to data that must follow specific legal requirements for storage and handling?

A. Intellectual Property
Incorrect.
B. Legal Data
Incorrect.
C. Trade Secrets
Incorrect.
D. Regulated Data
Correct!
14

When looking at change management programs which item is not a listed procedure, plan, or group?

A. Data Destruction
Correct!
B. Test Results
Incorrect.
C. Standard Operating Procedures
Correct!
D. Stakeholder Input
Incorrect.
15

There are three major types of encryption used in security. Which of the following is not one of the three encryption types?

A. Symmetric Encryption
Incorrect.
B. Hash Encryption
Incorrect.
C. Quad-Layer Encryption
Correct!
D. Asymmetric Encryption
Incorrect.
16

At a datacenter a user has been challenged by three different authentication methods as visible in the exhibit. Identify the option that BEST describes the multifactor authentication policy in use?

17

Risk management is a large part of blue team activities within the cybersecurity space. Which of the following is not one of the four Pillars of risk responses?

A. Avoid
Incorrect.
B. Isolate
Correct!
C. Accept
Incorrect.
D. Mitigate
Incorrect.
18

In the process of a server application under development, some errors are discovered to leave the application running in an unstable condition. One such error is a divide by zero error. The application should respond more appropriately to errors including generating error message when they appear. Which of the following would you implement?

A. Application hardening
Incorrect.
B. Patch management
Incorrect.
C. Exception handling
Correct!
D. Input validation
Incorrect.
19

As a cyber professional you can gain access to threat feeds for direct vulnerability information and updates. Which threat feed option would have a direct relation to search engines, blogs, social media platforms, and the dark web?

A. ProofPoint Emerging Threats
Incorrect.
B. Open-Source Intelligence
Correct!
C. CISA
Incorrect.
D. abuse.ch
Incorrect.
20

A handful of employees received e-mails from an online auction site, as it seemed. Upon clicking the call to action link users are required to put in their personal information. Upon investigation, it is discovered that the link does not go to the auction site, but to a duplicate site set up by an attacker. What is the type of this attack type?

A. Pharming
Incorrect.
B. Phishing
Correct!
C. Scam
Incorrect.
D. Identity theft
Incorrect.
21

Which type of site-level resiliency operates as a complete secondary operation of business with active assets in use?

A. Cloud
Incorrect.
B. Cold
Incorrect.
C. Warm
Incorrect.
D. Hot
Correct!
22

Which security option would be best to use to secure a server room from tampering by unauthorized individuals?

A. Locks
Correct!
B. Security Guard
Incorrect.
C. Cameras
Incorrect.
D. Motion Sensors
Incorrect.
23

When implementing a vendor diversity policy, what are the two advantages? (opt any two.))

24

A security audit has been carried recently, and a portion of its results are reflected in the table in the exhibit. What steps would you take to rectify the vulnerability shown in the exhibit?

25

Identify the protocol that is meant for use with passwords while also helping mitigate dictionary and brute-force attacks? (opt any two).

A. TrueCrypt
Incorrect.
B. Bcrypt
Correct!
C. PBKDF2
Correct!
D. HMAC
Incorrect.
26

About the validation process of vulnerability response and remediation, which step is not apart of this process?

A. Verification
Incorrect.
B. Patching
Correct!
C. Reporting
Incorrect.
D. Re-scanning
Incorrect.
30

Which Security Control Functional Type identifies attempted or successful intrusions?

A. Corrective
Incorrect.
B. Detective
Correct!
C. Deterrent
Incorrect.
D. Preventative
Incorrect.

SY0-701 Sample Question - CompTIA Security+

QuickStart is now offering you assessment questions to better aid in certification. 100% of the questions are real questions from a recent version of the test you will take.
$99.00
QuickStart is now offering you assessment questions to better aid in certification. 100% of the questions are real questions from a recent version of the test you will take.

More Information:

  • Learning Style: On Demand
  • Learning Style: Practice Exam
  • Difficulty: Beginner
  • Course Duration: 1 Hour
  • Course Info: Download PDF
  • Certificate: See Sample

Need Training for 5 or More People?

Customized to your team's need:

  • Annual Subscriptions
  • Private Training
  • Flexible Pricing
  • Enterprise LMS
  • Dedicated Customer Success Manager

Course Information

QuickStart is now offering sample questions for CompTIA Security+ SY0-601. Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice test to better aid in certification. 100% of the questions are real test questions; from a recent version of the CompTIA Security+ SY0-601 exam.

Outline

Hit button to validate captcha