Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA SY0-701 - CompTIA Security+ Exam 2026

Page: 10 / 17
Total 821 questions

Which of the following most securely protects data at rest?

A.

TLS 1.2

B.

AES-256

C.

Masking

D.

Salting

Which vulnerability is most likely mitigated by setting up an MDM platform?

A.

TPM

B.

Buffer overflow

C.

Jailbreaking

D.

SQL injection

Which of the following provides resilience by hosting critical VMs within different IaaS providers while being maintained by internal application owners?

A.

Multicloud architectures

B.

SaaS provider diversity

C.

On-premises server load balancing

D.

Corporate-owned, off-site locations

Which of the following security control types does an acceptable use policy best represent?

A.

Detective

B.

Compensating

C.

Corrective

D.

Preventive

A Chief Information Security Officer (CISO) has developed information security policies that relate to the software development methodology. Which of the following would the CISO most likely include in the organization ' s documentation?

A.

Peer review requirements

B.

Multifactor authentication

C.

Branch protection tests

D.

Secrets management configurations

Which of the following data types relates to data sovereignty?

A.

Data classified as public in other countries

B.

Personally Identifiable data while traveling

C.

Health data shared between doctors in other nations

D.

Data at rest outside of a country ' s borders

Which of the following are the best methods for hardening end user devices? (Select two)

A.

Full disk encryption

B.

Group-level permissions

C.

Account lockout

D.

Endpoint protection

E.

Proxy server

F.

Segmentation

A recent penetration test identified that an attacker could flood the MAC address table of network switches. Which of the following would best mitigate this type of attack?

A.

Load balancer

B.

Port security

C.

IPS

D.

NGFW

A penetration testing report indicated that an organization should implement controls related to database input validation. Which of the following best identifies the type of vulnerability that was likely discovered during the test?

A.

XSS

B.

Command injection

C.

Buffer overflow

D.

SQLi

Which of the following teams combines both offensive and defensive testing techniques to protect an organization ' s critical systems?

A.

Red

B.

Blue

C.

Purple

D.

Yellow

A company wants to protect a specialized legacy platform that controls the physical flow of gas inside of pipes. Which of the following environments does the company need to secure to best achieve this goal?

A.

IaaS

B.

SCADA

C.

SDN

D.

IoT

Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?

A.

Authorization

B.

Identification

C.

Non-repudiation

D.

Authentication

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

A.

VM escape

B.

SQL injection

C.

Buffer overflow

D.

Race condition

An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.

Which of the following best describes the user’s activity?

A.

Penetration testing

B.

Phishing campaign

C.

External audit

D.

Insider threat

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

A.

Disaster recovery plan

B.

Incident response procedure

C.

Business continuity plan

D.

Change management procedure