CompTIA SY0-701 - CompTIA Security+ Exam 2026
Which of the following describes the reason for using an MDM solution to prevent jailbreaking?
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
A company performs a risk assessment on the information security program each year. Which of the following best describes this risk assessment?
A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?
Which of the following must be considered when designing a high-availability network? (Choose two).
Which of the following is the best way to validate the integrity and availability of a disaster recovery site?
An attorney prints confidential documents to a copier in an office space near multiple workstations and a reception desk. When the attorney goes to the copier to retrieve the documents, the documents are missing. Which of the following would best prevent this from reoccurring?
An organization implemented cloud-managed IP cameras to monitor building entry points and sensitive areas. The service provider enables direct TCP/IP connection to stream live video footage from each camera. The organization wants to ensure this stream is encrypted and authenticated. Which of the following protocols should be implemented to best meet this objective?
A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?
An employee emailed a new systems administrator a malicious web link and convinced the administrator to change the email server ' s password. The employee used this access to remove the mailboxes of key personnel. Which of the following security awareness concepts would help prevent this threat in the future?
Which of the following enables the use of an input field to run commands that can view or manipulate data?
A company uses its backups to recover from a ransomware attack. Which of the following best guarantees that the backups are not infected?
An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test?
Which of the following activities should a systems administrator perform to quarantine a potentially infected system?
Which of the following would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed?
