
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Which of the following teams combines both offensive and defensive testing techniques to protect an organization’s critical systems?
- A. Red
- B. Blue
- C. Purple
- D. Yellow
During a trial, a judge determined evidence gathered from a hard drive was not admissible. Which of the following BEST explains this reasoning?
- A. The forensic investigator forgot to run a checksum on the disk image after creation.
- B. The chain of custody form did not note time zone offsets between transportation regions.
- C. The computer was turned off, and a RAM image could not be taken at the same time.
- D. The hard drive was not properly kept in an antistatic bag when it was moved.
An organization wants to implement a biometric system with the highest likelihood that an unauthorized user will be denied access. Which of the following should the organization use to compare biometric solutions?
- A. FRR
- B. Difficulty of use
- C. Cost
- D. FAR
- E. CER
Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?
- A. Impact analysis
- B. Scheduled downtime
- C. Backout plan
- D. Change management boards
An attacker was eavesdropping on a user who was shopping online. The attacker was able to spoof the IP address associated with the shopping site. Later, the user received an email regarding the credit card statement with unusual purchases. Which of the following attacks took place?
- A. On-path attack
- B. Protocol poisoning
- C. Domain hijacking
- D. Bluejacking
A legacy device is being decommissioned and is no longer receiving updates or patches. Which of the following describes this scenario?
- A. End of business
- B. End of testing
- C. End of support
- D. End of life
A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?
- A. Encryption at rest
- B. Masking
- C. Data classification
- D. Permission restrictions
A company’s end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
- A. Concurrent session usage
- B. Secure DNS cryptographic downgrade
- C. On-path resource consumption
- D. Reflected denial of service
A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?
- A. RBAC
- B. ACL
- C. SAML
- D. GPO
During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user’s intranet account? (Choose two.)
- A. Federation
- B. Identity proofing
- C. Password complexity
- D. Default password changes
- E. Password manager
- F. Open authentication