CompTIA Security+ (SYO-701) Sample Exam Questions
1
One of your systems has been infiltrated and a malicious actor has direct access. Which option would be the best to follow initially?
2
There are multiple wireless encryption methods used today. Which option would be the least recommended for any enterprise-level use?
3
In an organization, users are allowed to use company-issued tablets to access the network, with the permission to install only approved apps on the devices. What MDM feature would provide functionality meeting this requirement?
4
In a company users are now allowed to user mobile devices on the company network. A screen appears when users are connected to the company Wi-Fi, defining terms of use, and users have to click to acknowledge the agreement. The user is only allowed to connect to the network If he agrees to the terms by clicking Yes. This is an example of what?
5
What works as a neutral zone, separating public-facing servers from sensitive internal network resources?
6
Which of the following is not related to time-based restrictions? (opt any two)
7
Some gaps have been highlighted upon completing a security audit of a company. Recommendations from the report suggest upgrading some network components. The following requirements have been provided by the company: * A security device must be implemented consolidating various functions to protect the network, malicious websites to be filtered, and SPAM messages to be stopped. * Implement A tool using real-time and historical analysis to be implemented to identify malware and security incidents. Which of the following set of devices and tools is BEST suited for that purpose?
8
a friend of yours on a social network sends you a direct message telling you about a scheme offering a $100 gift card if you are one of the first 25 to respond to a survey. Upon clicking the link, you realize a malware has infected your machine. Identify the two attack principles you think have contributed to the effectiveness of this attack? (opt any two)
9
When referencing the CIA Triad which component is related to data that is stored and transferred as intended and any modification is authorized?
10
Which layer of the OSI Model is related to validating protocol and matching threat signatures with firewall configurations?
11
Which item is not included in the steps that make up the Impact portion of the analysis process?
12
An organization gets to know that it has been several months since it is under attack from an APT. Identify which type of attack was used for initial breach?
13
Data types are extremely important when categorizing data and establishing a security plan. Which data type would be related to data that must follow specific legal requirements for
storage and handling?
14
When looking at change management programs which item is not a listed procedure, plan, or group?
15
There are three major types of encryption used in security. Which of the following is not one of the three encryption types?
16
At a datacenter a user has been challenged by three different authentication methods as visible in the exhibit. Identify the option that BEST describes the multifactor authentication policy in use?
17
Risk management is a large part of blue team activities within the cybersecurity space. Which of the following is not one of the four Pillars of risk responses?
18
In the process of a server application under development, some errors are discovered to leave the application running in an unstable condition. One such error is a divide by zero error. The application should respond more appropriately to errors including generating error message when they appear. Which of the following would you implement?
19
As a cyber professional you can gain access to threat feeds for direct vulnerability information and updates. Which threat feed option would have a direct relation to search engines, blogs, social media platforms, and the dark web?
20
A handful of employees received e-mails from an online auction site, as it seemed. Upon clicking the call to action link users are required to put in their personal information. Upon investigation, it is discovered that the link does not go to the auction site, but to a duplicate site set up by an attacker. What is the type of this attack type?
21
Which type of site-level resiliency operates as a complete secondary operation of business with active assets in use?
22
Which security option would be best to use to secure a server room from tampering by unauthorized individuals?
23
When implementing a vendor diversity policy, what are the two advantages? (opt any two.))
24
A security audit has been carried recently, and a portion of its results are reflected in the table in the exhibit. What steps would you take to rectify the vulnerability shown in the exhibit?
25
Identify the protocol that is meant for use with passwords while also helping mitigate dictionary and brute-force attacks? (opt any two).
26
About the validation process of vulnerability response and remediation, which step is not apart of this process?
30
Which Security Control Functional Type identifies attempted or successful intrusions?