CompTIA SY0-701 - CompTIA Security+ Exam 2025
After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network. Which of the following is the most appropriate to disable?
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?
Which of the following provides the details about the terms of a test with a third-party penetration tester?
A company's online shopping website became unusable shortly after midnight on January 30, 2023. When a security analyst reviewed the database server, the analyst noticed the following code used for backing up data:
Which of the following should the analyst do next?
Which of the following is the phase in the incident response process when a security analyst reviews roles and responsibilities?
Which of the following is a benefit of vendor diversity?
An organization is adopting cloud services at a rapid pace and now has multiple SaaS applications in use. Each application has a separate log-in. so the security team wants to reduce the number of credentials each employee must maintain. Which of the following is the first step the security team should take?
Which of the following activities uses OSINT?
Which of the following cryptographic methods is preferred for securing communications with limited computing resources?
Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?
During a recent company safety stand-down, the cyber-awareness team gave a presentation on the importance of cyber hygiene. One topic the team covered was best practices for printing centers. Which of the following describes an attack method that relates to printing centers?
An external vendor recently visited a company's headquarters tor a presentation. Following the visit a member of the hosting team found a file that the external vendor left behind on a server. The file contained detailed architecture information and code snippets. Which of the following data types best describes this file?
Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?
A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?
An employee decides to collect PII data from the company's system for personal use. The employee compresses the data into a single encrypted file before sending the file to their personal email. The security department becomes aware of the attempted misuse and blocks the attachment from leaving the corporate environment. Which of the following types of employee training would most likely reduce the occurrence of this type of issue?
(Select two).