CompTIA SY0-701 - CompTIA Security+ Exam 2025
Which of the following would most likely be used by attackers to perform credential harvesting?
During a security incident, the security operations team identified sustained network traffic from a malicious IP address:
10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?
Company A jointly develops a product with Company B, which is located in a different country. Company A finds out that their intellectual property is being shared with unauthorized companies. Which of the following has been breached?
A security analyst created a fake account and saved the password in a non-readily accessible directory in a spreadsheet. An alert was also configured to notify the security team if the spreadsheet is opened. Which of the following best describes the deception method being deployed?
Which of the following can be used to identify potential attacker activities without affecting production servers?
A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker accessed a blocked sue from a work computer and repotted the issue. While Investigating the issue, a security administrator found another device providing internet access to certain employees. Which of the following best describes the security risk?
Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?
A security administrator recently reset local passwords and the following values were recorded in the system:
Which of the following in the security administrator most likely protecting against?
Which of the following security controls are a company implementing by deploying HIPS? (Select two).
A company's Chief Information Security Officer (CISO) wants to enhance the capabilities of the incident response team. The CISO directs the incident response team to deploy a tool that rapidlyanalyzes host and network data from potentially compromised systems and forwards the data for further review. Which of the following tools should the incident response team deploy?
Which of the following tasks is typically included in the BIA process?
Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company's internal network?
Which of the following is an example of a data protection strategy that uses tokenization?
A company plans to secure its systems by:
Preventing users from sending sensitive data over corporate email
Restricting access to potentially harmful websites
Which of the following features should the company set up? (Select two).
A security team created a document that details the order in which critical systems should be through back online after a major outage. Which of the following documents did the team create?