CompTIA SY0-701 - CompTIA Security+ Exam 2025
A company is implementing a policy to allow employees to use their personal equipment for work. However, the company wants to ensure that only company-approved applications can be installed. Which of the following addresses this concern?
A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future?
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?
Which of the following activities are associated with vulnerability management? (Select two).
Which of the following definitions best describes the concept of log co-relation?
After a recent ransomware attack on a company's system, an administrator reviewed the log files. Which of the following control types did the administrator use?