CompTIA SY0-701 - CompTIA Security+ Exam 2026
A security professional discovers a folder containing an employee ' s personal information on the enterprise ' s shared drive. Which of the following best describes the data type the securityprofessional should use to identify organizational policies and standards concerning the storage of employees ' personal information?
An incident response specialist must stop a malicious attack from expanding to other parts of an organization. Which of the following should the incident response specialist perform first?
An unknown source has attacked an organization’s network multiple times. The organization has a firewall but no other source of protection against these attacks. Which of the following is the best security item to add?
A website user is locked out of an account after clicking an email link and visiting a different website Web server logs show the user ' s password was changed, even though the user did not change the password. Which of the following is the most likely cause?
A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:
Which of the following best describes the indicator that triggered the alert?
Which of the following incident response activities ensures evidence is properly handied?
A company wants to verify that the software the company is deploying came from the vendor the company purchased the software from. Which of the following is the best way for the company to confirm this information?
Which of the following would a systems administrator follow when upgrading the firmware of an organization ' s router?
Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.
INSTRUCTIONS
Not all attacks and remediation actions will be used.
If at any time you would like to bring back the initial state of the simu-lation, please click the Reset All button.

Which of the following should be used to ensure a device is inaccessible to a network-connected resource?
Which of the following allows an exploit to go undetected by the operating system?
Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach that would affect offshore offices. Which of the following is this an example of?
Which of the following is the best way to improve the confidentiality of remote connections to an enterprise ' s infrastructure?
Which of the following best describe the benefits of a microservices architecture when compared to a monolithic architecture? (Select two).
An engineer needs to ensure that a script has not been modified before it is launched. Which of the following best provides this functionality?


A screenshot of a computer program Description automatically generated with low confidence