Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA SY0-701 - CompTIA Security+ Exam 2026

Page: 12 / 17
Total 821 questions

A systems administrator needs to encrypt all data on employee laptops. Which of the following encryption levels should be implemented?

A.

Volume

B.

Partition

C.

Full disk

D.

File

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

A.

Data in use

B.

Data in transit

C.

Geographic restrictions

D.

Data sovereignty

Which of the following attacks primarily targets insecure networks?

A.

Evil twin

B.

Impersonation

C.

Watering hole

D.

Pretexting

An organization is evaluating new regulatory requirements associated with the implementation of corrective controls on a group of interconnected financial systems. Which of the following is the most likely reason for the new requirement?

A.

To defend against insider threats altering banking details

B.

To ensure that errors are not passed to other systems

C.

To allow for business insurance to be purchased

D.

To prevent unauthorized changes to financial data

A company performs risk analysis on its equipment and estimates it will experience about ten incidents over a five-year period. Which of the following is the correct ARO for the equipment?

A.

2

B.

5

C.

10

D.

50

As part of new compliance audit requirements, multiple servers need to be segmented on different networks and should be reachable only from authorized internal systems. Which of the following would meet the requirements?

A.

Configure firewall rules to block external access to Internal resources.

B.

Set up a WAP to allow internal access from public networks.

C.

Implement a new IPSec tunnel from internal resources.

D.

Deploy an Internal Jump server to access resources.

Which of the following tools is best for logging and monitoring in a cloud environment?

A.

IPS

B.

FIM

C.

NAC

D.

SIEM

A customer of a large company receives a phone call from someone claiming to work for the company and asking for the customer ' s credit card information. The customer sees the caller ID is the same as the company ' s main phone number. Which of the following attacks is the customer most likely a target of?

A.

Phishing

B.

Whaling

C.

Smishing

D.

Vishing

A store is setting up wireless access for their employees. Management wants to limit the number of access points while ensuring all areas of the store are covered. Which of the following tools will help management determine the number of access points needed?

A.

Signal locator

B.

WPA3

C.

Heat map

D.

Site survey

Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?

A.

Physical

B.

Managerial

C.

Technical

D.

Operational

Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company ' s internal network?

A.

VPN

B.

LDAP

C.

FTP

D.

RADIUS

The local administrator account for a company ' s VPN appliance was unexpectedly used to log in to the remote management interface. Which of the following would have most likely prevented this from happening ' ?

A.

Using least privilege

B.

Changing the default password

C.

Assigning individual user IDs

D.

Reviewing logs more frequently

Which of the following phases of the incident response process attempts to minimize disruption?

A.

Recovery

B.

Containment

C.

Preparation

D.

Analysis

A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?

A.

SOAR

B.

SIEM

C.

MDM

D.

DLP

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

A.

Change management ticketing system

B.

Behavioral analyzer

C.

Collaboration platform

D.

Version control tool