CompTIA SY0-701 - CompTIA Security+ Exam 2026
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)
Which of the following exercises should an organization use to improve its incident response process?
The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?
A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?
Which of the following should a technician perform to verify the integrity of a file transferred from one device to another?
A company is working with a vendor to perform a penetration test Which of the following includes an estimate about the number of hours required to complete the engagement?
Sine© a recent upgrade (o a WLAN infrastructure, several mobile users have been unable to access the internet from the lobby. The networking team performs a heat map survey of the building and finds several WAPs in the area. The WAPs are using similar frequencies with high power settings. Which of the following installation considerations should the security team evaluate next?
An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?
A security analyst is reviewing the following logs:

Which of the following attacks is most likely occurring?
Which of the following describes an executive team that is meeting in a board room and testing the company ' s incident response plan?
Which of the following security controls would best guard a payroll system against insider manipulation threats?
Which of the following is a benefit of launching a bug bounty program? (Select two)
The Cruel Information Security Officer (CISO) asks a security analyst to install an OS update to a production VM that has a 99% uptime SLA. The CISO tells me analyst the installation must be done as quickly as possible. Which of the following courses of action should the security analyst take first?
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?
