Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA SY0-701 - CompTIA Security+ Exam 2025

Page: 4 / 12
Total 569 questions

Which of the following is the most relevant reason a DPO would develop a data inventory?

A.

To manage data storage requirements better

B.

To determine the impact in the event of a breach

C.

To extend the length of time data can be retained

D.

To automate the reduction of duplicated data

Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?

A.

TPM

B.

ECC

C.

FDE

D.

HSM

A site reliability engineer is designing a recovery strategy that requires quick failover to an identical site if the primary facility goes down. Which of the following types of sites should the engineer consider?

A.

Recovery site

B.

Hot site

C.

Cold site

D.

Warm site

During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?

A.

Analysis

B.

Lessons learned

C.

Detection

D.

Containment

For which of the following reasons would a systems administrator leverage a 3DES hash from an installer file that is posted on a vendor's website?

A.

To test the integrity of the file

B.

To validate the authenticity of the file

C.

To activate the license for the file

D.

To calculate the checksum of the file

Which of the following techniques would identify whether data has been modified in transit?

A.

Hashing

B.

Tokenization

C.

Masking

D.

Encryption

A systems administrator wants to use a technical solution to explicitly define file permissions for the entire team. Which of the following should the administrator implement?

A.

ACL

B.

Monitoring

C.

Isolation

D.

HIPS

A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:

• An existing Internal certificate must be used.

• Wired and wireless networks must be supported

• Any unapproved device should be Isolated in a quarantine subnet

• Approved devices should be updated before accessing resources

Which of the following would best meet the requirements?

A.

802.IX

B.

EAP

C.

RADIUS

D.

WPA2

A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?

A.

Server multiprocessing

B.

Warm site

C.

Load balancer

D.

Proxy server

A company identified the potential for malicious insiders to harm the organization. Which of the following measures should the organization implement to reduce this risk?

A.

Unified threat management

B.

Web application firewall

C.

User behavior analytics

D.

Intrusion detection system

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

A.

Disaster recovery plan

B.

Incident response procedure

C.

Business continuity plan

D.

Change management procedure

Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?

A.

Compliance reporting

B.

GDPR

C.

Due diligence

D.

Attestation

Which of the following is a type of vulnerability that may result from outdated algorithms or keys?

A.

Hash collision

B.

Cryptographic

C.

Buffer overflow

D.

Input validation

A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?

A.

Concurrent session usage

B.

Secure DNS cryptographic downgrade

C.

On-path resource consumption

D.

Reflected denial of service

Which of the following would be the best way to handle a critical business application that is running on a legacy server?

A.

Segmentation

B.

Isolation

C.

Hardening

D.

Decommissioning