Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA SY0-701 - CompTIA Security+ Exam 2026

Page: 14 / 17
Total 821 questions

Which of the following tasks is typically included in the BIA process?

A.

Estimating the recovery time of systems

B.

Identifying the communication strategy

C.

Evaluating the risk management plan

D.

Establishing the backup and recovery procedures

E.

Developing the incident response plan

An administrator wants to automate an account permissions update for a large number of accounts. Which of the following would best accomplish this task?

A.

Security groups

B.

Federation

C.

User provisioning

D.

Vertical scaling

A security analyst identifies an incident in the network. Which of the following incident response activities would the security analyst perform next?

A.

Containment

B.

Detection

C.

Eradication

D.

Recovery

Which of the following is the most likely benefit of conducting an internal audit?

A.

Findings are reported to shareholders.

B.

Reports are not formal and can be reassigned.

C.

Control gaps are identified for remediation.

D.

The need for external audits is eliminated.

Which of the following security concepts is accomplished with the installation of a RADIUS server?

A.

CIA

B.

AA

C.

ACL

D.

PEM

Which of the following digital forensics activities would a security team perform when responding to legal requests in a pending investigation?

A.

E-discovery

B.

User provisioning

C.

Firewall log export

D.

Root cause analysis

Which of the following security threats aims to compromise a website that multiple employees frequently visit?

A.

Supply chain

B.

Typosquatting

C.

Watering hole

D.

Impersonation

Which of the following best represents an application that does not have an on-premises requirement and is accessible from anywhere?

A.

Pass

B.

Hybrid cloud

C.

Private cloud

D.

IaaS

E.

SaaS

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

A.

DLP software

B.

DNS filtering

C.

File integrity monitoring

D.

Stateful firewall

A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?

A.

Install endpoint protection

B.

Disable ports/protocols

C.

Change default passwords

D.

Remove unnecessary software

A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?

A.

Wireless access point

B.

Switch

C.

Firewall

D.

NAC

A security analyst reviews domain activity logs and notices the following:

Which of the following is the best explanation for what the security analyst has discovered?

A.

The user jsmith ' s account has been locked out.

B.

A keylogger is installed on [smith ' s workstation

C.

An attacker is attempting to brute force ismith ' s account.

D.

Ransomware has been deployed in the domain.

A company recently decided to allow employees to work remotely. The company wants to protect us data without using a VPN. Which of the following technologies should the company Implement?

A.

Secure web gateway

B.

Virtual private cloud end point

C.

Deep packet Inspection

D.

Next-gene ration firewall

Which of the following technologies assists in passively verifying the expired status of a digital certificate?

A.

OCSP

B.

CRL

C.

TPM

D.

CSR

Which of the following is a technical security control?

A.

Security guard

B.

Policy

C.

Fence

D.

Firewall