Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA SY0-701 - CompTIA Security+ Exam 2025

Page: 2 / 13
Total 642 questions

After creating a contract for IT contractors, the human resources department changed several clauses. The contract has gone through three revisions. Which of the following processes should the human resources department follow to track revisions?

A.

Version validation

B.

Version changes

C.

Version updates

D.

Version control

Which of the following attacks primarily targets insecure networks?

A.

Evil twin

B.

Impersonation

C.

Watering hole

D.

Pretexting

A recent black-box penetration test of http://example.com discovered that external

website vulnerabilities exist, such as directory traversals, cross-site scripting, cross-site forgery, and insecure protocols.

You are tasked with reducing the attack space and enabling secure protocols.

INSTRUCTIONS

Part 1

Use the drop-down menus to select the appropriate technologies for each location to implement a secure and resilient web architecture. Not all technologies will be used, and technologies may be used multiple times.

Part 2

Use the drop-down menus to select the appropriate command snippets from the drop-down menus. Each command section must be filled.

Which of the following should a security team do first before a new web server goes live?

A.

Harden the virtual host.

B.

Create WAF rules.

C.

Enable network intrusion detection.

D.

Apply patch management

At the start of a penetration test, the tester checks OSINT resources for information about the client environment. Which of the following types of reconnaissance is the tester performing?

A.

Active

B.

Passive

C.

Offensive

D.

Defensive

Which of the following control types describes an alert from a SIEM tool?

A.

Preventive

B.

Corrective

C.

Compensating

D.

Detective

Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequences. Which of the following agreements does this best describe?

A.

SLA

B.

BPA

C.

NDA

D.

MOA

An engineer moved to another team and is unable to access the new team's shared folders while still being able to access the shared folders from the former team. After opening a ticket, the engineer discovers that the account was never moved to the new group. Which of the following access controls is most likely causing the lack of access? 1  

A.

Role-based

B.

Discretionary

C.

Time of day

D.

Least privilege

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.

Which of the following is the most important consideration during development?

A.

Scalability

B.

Availability

C.

Cost

D.

Ease of deployment

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

A.

Jump server

B.

RADIUS

C.

HSM

D.

Load balancer

A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?

A.

Geographic dispersion

B.

Platform diversity

C.

Hot site

D.

Load balancing

Which of the following actors attacking an organization is the most likely to be motivated by personal beliefs?

A.

Nation-state

B.

Organized crime

C.

Hacktvist

D.

Insider threat

A security officer observes that a software development team is not complying with its corporate security policy on encrypting confidential data. Which of the following categories refers to this type of non-compliance?

A.

External

B.

Standard

C.

Regulation

D.

Internal

While conducting a business continuity tabletop exercise, the security team becomes concerned by potential impacts if a generator fails during failover. Which of the following is the team most likely to consider in regard to risk management activities?

A.

RPO

B.

ARO

C.

BIA

D.

MTTR

Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

A.

VM escape

B.

SQL injection

C.

Buffer overflow

D.

Race condition