CompTIA SY0-701 - CompTIA Security+ Exam 2025
Which of the following is the most relevant reason a DPO would develop a data inventory?
Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?
A site reliability engineer is designing a recovery strategy that requires quick failover to an identical site if the primary facility goes down. Which of the following types of sites should the engineer consider?
During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?
For which of the following reasons would a systems administrator leverage a 3DES hash from an installer file that is posted on a vendor's website?
Which of the following techniques would identify whether data has been modified in transit?
A systems administrator wants to use a technical solution to explicitly define file permissions for the entire team. Which of the following should the administrator implement?
A systems administrator is redesigning now devices will perform network authentication. The following requirements need to be met:
• An existing Internal certificate must be used.
• Wired and wireless networks must be supported
• Any unapproved device should be Isolated in a quarantine subnet
• Approved devices should be updated before accessing resources
Which of the following would best meet the requirements?
A company has a website in a server cluster. One server is experiencing very high usage, while others are nearly unused. Which of the following should the company configure to help distribute traffic quickly?
A company identified the potential for malicious insiders to harm the organization. Which of the following measures should the organization implement to reduce this risk?
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?
Which of the following is a type of vulnerability that may result from outdated algorithms or keys?
A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
Which of the following would be the best way to handle a critical business application that is running on a legacy server?