CompTIA Security+ SY0-701 Free Dumps

  1. Home
  2. /
  3. Free Dumps
  4. /
  5. CompTIA Security+ SY0-701 Free...
CompTIA Security+ SY0-701 certification promotion with the logo, headline 'Pass in 3 Days' and 'Pay After You Pass' button, on a clean white background.

Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!

Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!

 

Question 91
0
Please leave a feedback on thisx

Which of the following describes the maximum allowance of accepted risk?

  • A. Risk indicator
  • B. Risk level
  • C. Risk score
  • D. Risk threshold

 

 

 

 

 

Question 92
0
Please leave a feedback on thisx

A security analyst receives alerts about an internal system sending a large amount of unusual DNS queries to systems on the internet over short periods of time during non-business hours. Which of the following is most likely occurring?

  • A. A worm is propagating across the network.
  • B. Data is being exfiltrated.
  • C. A logic bomb is deleting data.
  • D. Ransomware is encrypting files.

 

 

 

 

Question 93
0
Please leave a feedback on thisx

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

  • A. Default credentials
  • B. Non-segmented network
  • C. Supply chain vendor
  • D. Vulnerable software

 

 

 

 

 

Question 94
0
Please leave a feedback on thisx

A systems administrator is working on a solution with the following requirements:
• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?

  • A. Zero Trust
  • B. AAA
  • C. Non-repudiation
  • D. CIA

 

 

 

 

Question 95
0
Please leave a feedback on thisx

Which of the following involves an attempt to take advantage of database misconfigurations?

  • A. Buffer overflow
  • B. SQL injection
  • C. VM escape
  • D. Memory injection

 

 

 

Question 96
0
Please leave a feedback on thisx

Which of the following is used to validate a certificate when it is presented to a user?

  • A. OCSP
  • B. CSR
  • C. CA
  • D. CRC

 

 

 

 

Question 97
0
Please leave a feedback on thisx

One of a company’s vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?

  • A. Virtualization
  • B. Firmware
  • C. Application
  • D. Operating system

 

 

 

 

Question 98
0
Please leave a feedback on thisx

Which of the following is used to quantitatively measure the criticality of a vulnerability?

  • A. CVE
  • B. CVSS
  • C. CIA
  • D. CERT

 

 

 

 

Question 99
0
Please leave a feedback on thisx

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

  • A. Configure all systems to log scheduled tasks.
  • B. Collect and monitor all traffic exiting the network.
  • C. Block traffic based on known malicious signatures.
  • D. Install endpoint management software on all systems

 

 

 

 

Question 100
0
Please leave a feedback on thisx

An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN protecting?

  • A. Data in use
  • B. Data in transit
  • C. Geographic restrictions
  • D. Data sovereignty

 

 

 

 

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
error: Content is protected !!