CompTIA SY0-701 - CompTIA Security+ Exam 2025
Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?
An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?
A customer has a contract with a CSP and wants to identify which controls should be implemented in the IaaS enclave. Which of the following is most likely to contain this information?
Which of the following is an example of memory injection?
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?
Which of the following describes the process of concealing code or text inside a graphical image?
Which of the following enables the use of an input field to run commands that can view or manipulate data?
A company with a high-availability website is looking to harden its controls at any cost. The company wants to ensure that the site is secure by finding any possible issues. Which of the following would most likely achieve this goal?
A security analyst is assessing several company firewalls. Which of the following cools would The analyst most likely use to generate custom packets to use during the assessment?
Which of the following techniques would attract the attention of a malicious attacker in an insider threat scenario?
A company is using a legacy FTP server to transfer financial data to a third party. The legacy system does not support SFTP, so a compensating control is needed to protect the sensitive, financial data in transit. Which of the following would be the most appropriate for the company to use?
Which of the following is a primary security concern for a company setting up a BYOD program?
A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file's creator. Which of the following actions would most likely give the security analyst the information required?
Which of the following methods to secure credit card data is best to use when a requirement is to see only the last four numbers on a credit card?