CompTIA SY0-701 - CompTIA Security+ Exam 2025
In which of the following scenarios is tokenization the best privacy technique 10 use?
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
A systems administrator needs to ensure the secure communication of sensitive data within the organization's private cloud. Which of the following is the best choice for the administrator to implement?
Which of the following must be considered when designing a high-availability network? (Choose two).
An incident response specialist must stop a malicious attack from expanding to other parts of an organization. Which of the following should the incident response specialist perform first?
Which of the following is the stage in an investigation when forensic images are obtained?
Which of the following is a risk of conducting a vulnerability assessment?
A network administrator wants to ensure that network traffic is highly secure while in transit. Which of the following actions best describes the actions the network administrator should take?
An attacker submits a request containing unexpected characters in an attempt to gain unauthorized access to information within the underlying systems. Which of the following best describes this attack?
A security manager is implementing MFA and patch management. Which of the following would best describe the control type and category? (Select two).
A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
In a rush to meet an end-of-year business goal, the IT department was told to implement a new business application. The security engineer reviews the attributes of the application and decides the time needed to perform due diligence is insufficient from a cybersecurity perspective. Which of the following best describes the security engineer's response?
Which of the following is the most common data loss path for an air-gapped network?
A university employee logged on to the academic server and attempted to guess the system administrators' log-in credentials. Which of the following security measures should the university have implemented to detect the employee's attempts to gain access to the administrators' accounts?
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?