CompTIA SY0-701 - CompTIA Security+ Exam 2026
Which of the following tasks is typically included in the BIA process?
An administrator wants to automate an account permissions update for a large number of accounts. Which of the following would best accomplish this task?
A security analyst identifies an incident in the network. Which of the following incident response activities would the security analyst perform next?
Which of the following is the most likely benefit of conducting an internal audit?
Which of the following security concepts is accomplished with the installation of a RADIUS server?
Which of the following digital forensics activities would a security team perform when responding to legal requests in a pending investigation?
Which of the following security threats aims to compromise a website that multiple employees frequently visit?
Which of the following best represents an application that does not have an on-premises requirement and is accessible from anywhere?
A company plans to secure its systems by:
Preventing users from sending sensitive data over corporate email
Restricting access to potentially harmful websites
Which of the following features should the company set up? (Select two).
A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?
A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?
A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?
A company recently decided to allow employees to work remotely. The company wants to protect us data without using a VPN. Which of the following technologies should the company Implement?
Which of the following technologies assists in passively verifying the expired status of a digital certificate?
Which of the following is a technical security control?
