CompTIA SY0-701 - CompTIA Security+ Exam 2025
Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?
A Chief Information Security Officer would like to conduct frequent, detailed reviews of systems and procedures to track compliance objectives. Which of the following is the best method to achieve this objective?
Malware spread across a company's network after an employee visited a compromised industry blog. Which of the following best describes this type of attack?
An organization would like to calculate the time needed to resolve a hardware issue with a server. Which of the following risk management processes describes this example?
A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering.
Which of the following teams will conduct this assessment activity?
Which of the following explains why an attacker cannot easily decrypt passwords using a rainbow table attack?
An organization has recently decided to implement SSO. The requirements are to leverage access tokens and focus on application authorization rather than user authentication. Which of the following solutions would the engineering team most likely configure?
Cadets speaking a foreign language are using company phone numbers to make unsolicited phone calls lo a partner organization. A security analyst validates through phone system logs that the calls are occurring and the numbers are not being spoofed. Which of the following is the most likely explanation?
Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).
A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?
Which of the following documents details how to accomplish a technical security task?
Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?
An unexpected and out-of-character email message from a Chief Executive Officer’s corporate account asked an employee to provide financial information and to change the recipient's contact number. Which of the following attack vectors is most likely being used?
An enterprise security team is researching a new security architecture to better protect the company's networks and applications against the latest cyberthreats. The company has a fully remote workforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?