
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Which of the following describes the maximum allowance of accepted risk?
- A. Risk indicator
- B. Risk level
- C. Risk score
- D. Risk threshold
A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?
- A. A worm is propagating across the network.
- B. Data is being exfiltrated.
- C. A logic bomb is deleting data.
- D. Ransomware is encrypting files.
A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?
- A. Default credentials
- B. Non-segmented network
- C. Supply chain vendor
- D. Vulnerable software
A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?
- A. Zero Trust
- B. AAA
- C. Non-repudiation
- D. CIA
Which of the following involves an attempt to take advantage of database misconfigurations?
- A. Buffer overflow
- B. SQL injection
- C. VM escape
- D. Memory injection
Which of the following is used to validate a certificate when it is presented to a user?
- A. OCSP
- B. CSR
- C. CA
- D. CRC
One of a company’s vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?
- A. Virtualization
- B. Firmware
- C. Application
- D. Operating system
Which of the following is used to quantitatively measure the criticality of a vulnerability?
- A. CVE
- B. CVSS
- C. CIA
- D. CERT
Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?
- A. Configure all systems to log scheduled tasks.
- B. Collect and monitor all traffic exiting the network.
- C. Block traffic based on known malicious signatures.
- D. Install endpoint management software on all systems
An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?
- A. Data in use
- B. Data in transit
- C. Geographic restrictions
- D. Data sovereignty