CompTIA SY0-701 - CompTIA Security+ Exam 2026
A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?
A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?
Which of the following objectives is best achieved by a tabletop exercise?
Which of the following activities are associated with vulnerability management? (Select two).
A business provides long-term cold storage services to banks that are required to follow regulator-imposed data retention guidelines. Banks that use these services require that data is disposed of in a specific manner at the conclusion of the regulatory threshold for data retention. Which of the following aspects of data management is the most important to the bank in the destruction of this data?
A user sends an email that includes a digital signature for validation. Which of the following security concepts would ensure that a user cannot deny that they sent the email?
A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline Which of the following should the analyst use?
A staff member finds a USB drive in the office ' s parking lot. Which of the following should the staff member do?
Which of the following would a security administrator use to comply with a secure baseline during a patch update?
You are security administrator investigating a potential infection on a network.
Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.







An administrator installs an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?
Which of the following architectures is most suitable to provide redundancy for critical business processes?
One of a company ' s vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?
Which of the following types of identification methods can be performed on a deployed application during runtime?
A security analyst must select a metric to determine the required investment in technology based on past availability incidents. Which of the following is the most relevant value to help select technology that mitigates risk and considers reliability?


A screenshot of a computer AI-generated content may be incorrect.