
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
An IT manager is increasing the security capabilities of an organization after a data classification initiative determined that sensitive data could be exfiltrated from the environment. Which of the following solutions would mitigate the risk?
- A. XDR
- B. SPF
- C. DLP
- D. DMARC
Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?
- A. IDS
- B. ACL
- C. EDR
- D. NAC
Client files can only be accessed by employees who need to know the information and have specified roles in the company. Which of the following best describes this security concept?
- A. Availability
- B. Confidentiality
- C. Integrity
- D. Non-repudiation
Which of the following describes the category of data that is most impacted when it is lost?
- A. Confidential
- B. Public
- C. Private
- D. Critical
A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?
- A. Business email
- B. Social engineering
- C. Unsecured network
- D. Default credentials
Which of the following describes the understanding between a company and a client about what will be provided and the accepted time needed to provide the company with the resources?
- A. SLA
- B. MOU
- C. MOA
- D. BPA
A company that is located in an area prone to hurricanes is developing a disaster recovery plan and looking at site considerations that allow the company to immediately continue operations. Which of the following is the best type of site for this company?
- A. Cold
- B. Tertiary
- C. Warm
- D. Hot
Which of the following security controls is most likely being used when a critical legacy server is segmented into a private network?
- A. Deterrent
- B. Corrective
- C. Compensating
- D. Preventive
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?
- A. Compliance reporting
- B. GDPR
- C. Due diligence
- D. Attestation
Which of the following considerations is the most important for an organization to evaluate as it establishes and maintains a data privacy program?
- A. Reporting structure for the data privacy officer
- B. Request process for data subject access
- C. Role as controller or processor
- D. Physical location of the company