Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CompTIA SY0-701 - CompTIA Security+ Exam 2025

Page: 6 / 13
Total 642 questions

Which of the following describes the procedures a penetration tester must follow while conducting a test?

A.

Rules of engagement

B.

Rules of acceptance

C.

Rules of understanding

D.

Rules of execution

A security analyst scans a company's public network and discovers a host is running a remote desktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

A.

Changing the remote desktop port to a non-standard number

B.

Setting up a VPN and placing the jump server inside the firewall

C.

Using a proxy for web connections from the remote desktop server

D.

Connecting the remote server to the domain and increasing the password length

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

A.

Public key infrastructure

B.

Open public ledger

C.

Public key encryption

D.

Key escrow

Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?

A.

Encryption

B.

Hashing

C.

Masking

D.

Tokenization

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

A.

Bollards

B.

Access badge

C.

Motion sensor

D.

Video surveillance

A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?

A.

Encryption at rest

B.

Masking

C.

Data classification

D.

Permission restrictions

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

A.

Key stretching

B.

Data masking

C.

Steganography

D.

Salting

A company is using a legacy FTP server to transfer financial data to a third party. The legacy system does not support SFTP, so a compensating control is needed to protect the sensitive, financial data in transit. Which of the following would be the most appropriate for the company to use?

A.

Telnet connection

B.

SSH tunneling

C.

Patch installation

D.

Full disk encryption

Which of the following environments utilizes a subset of customer data and is most likely to be used to assess the impacts of major system upgrades and demonstrate system features?

A.

Development

B.

Test

C.

Production

D.

Staging

Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?

A.

Authorization

B.

Identification

C.

Non-repudiation

D.

Authentication

The internal audit team determines a software application is no longer in scope for external reporting requirements. Which of the following will confirm management’s perspective that the application is no longer applicable?

A.

Data inventory and retention

B.

Right to be forgotten

C.

Due care and due diligence

D.

Acknowledgement and attestation

An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?

A.

NGFW

B.

WAF

C.

TLS

D.

SD-WAN

An incident response specialist must stop a malicious attack from expanding to other parts of an organization. Which of the following should the incident response specialist perform first?

A.

Eradication

B.

Recovery

C.

Containment

D.

Simulation

Which of the following is the best reason to complete an audit in a banking environment?

A.

Regulatory requirement

B.

Organizational change

C.

Self-assessment requirement

D.

Service-level requirement

An analyst is reviewing an incident in which a user clicked on a link in a phishing email. Which of the following log sources would the analyst utilize to determine whether the connection was successful?

A.

Network

B.

System

C.

Application

D.

Authentication