
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
A company is required to perform a risk assessment on an annual basis. Which of the following types of risk assessments does this requirement describe?
- A. Continuous
- B. Ad hoc
- C. Recurring
- D. One time
After a recent ransomware attack on a company’s system, an administrator reviewed the log files. Which of the following control types did the administrator use?
- A. Compensating
- B. Detective
- C. Preventive
- D. Corrective
Which of the following exercises should an organization use to improve its incident response process?
- A. Tabletop
- B. Replication
- C. Failover
- D. Recovery
Which of the following best ensures minimal downtime and data loss for organizations with critical computing equipment located in earthquake-prone areas?
- A. Generators and UPS
- B. Off-site replication
- C. Redundant cold sites
- D. High availability networking
A newly identified network access vulnerability has been found in the OS of legacy IoT devices. Which of the following would best mitigate this vulnerability quickly?
- A. Insurance
- B. Patching
- C. Segmentation
- D. Replacement
After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?
- A. Group Policy
- B. Content filtering
- C. Data loss prevention
- D. Access control lists
A client demands at least 99.99% uptime from a service provider’s hosted security services. Which of the following documents includes the information the service provider should return to the client?
- A. MOA
- B. SOW
- C. MOU
- D. SLA
A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?
- A. Certification
- B. Inventory list
- C. Classification
- D. Proof of ownership
A company is planning a disaster recovery site and needs to ensure that a single natural disaster would not result in the complete loss of regulated backup data. Which of the following should the company consider?
- A. Geographic dispersion
- B. Platform diversity
- C. Hot site
- D. Load balancing
A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the file’s creator. Which of the following actions would most likely give the security analyst the information required?
- A. Obtain the file’s SHA-256 hash.
- B. Use hexdump on the file’s contents.
- C. Check endpoint logs.
- D. Query the file’s metadata.