
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?
- A. Hot site
- B. Cold site
- C. Failover site
- D. Warm site
An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?
- A. Deploy multifactor authentication.
- B. Decrease the level of the web filter settings.
- C. Implement security awareness training.
- D. Update the acceptable use policy.
Which of the following teams is best suited to determine whether a company has systems that can be exploited by a potential, identified vulnerability?
- A. Purple team
- B. Blue team
- C. Red team
- D. White team
A company is reviewing options to enforce user logins after several account takeovers. The following conditions must be met as part of the solution:
• Allow employees to work remotely or from assigned offices around the world.
• Provide a seamless login experience.
• Limit the amount of equipment required.
Which of the following best meets these conditions?
- A. Trusted devices
- B. Geotagging
- C. Smart cards
- D. Time-based logins
Which of the following methods can be used to detect attackers who have successfully infiltrated a network? (Choose two.)
- A. Tokenization
- B. CI/CD
- C. Honeypots
- D. Threat modeling
- E. DNS sinkhole
- F. Data obfuscation
A company wants to ensure that the software it develops will not be tampered with after the final version is completed. Which of the following should the company most likely use?
- A. Hashing
- B. Encryption
- C. Baselines
- D. Tokenization
An organization completed a project to deploy SSO across all business applications last year. Recently, the finance department selected a new cloud-based accounting software vendor. Which of the following should most likely be configured during the new software deployment?
- A. RADIUS
- B. SAML
- C. EAP
- D. OpenID
A user, who is waiting for a flight at an airport, logs in to the airline website using the public Wi-Fi, ignores a security warning and purchases an upgraded seat. When the flight lands, the user finds unauthorized credit card charges. Which of the following attacks most likely occurred?
- A. Replay attack
- B. Memory leak
- C. Buffer overflow attack
- D. On-path attack
A network engineer deployed a redundant switch stack to increase system availability. However, the budget can only cover the cost of one ISP connection. Which of the following best describes the potential risk factor?
- A. The equipment MTBF is unknown.
- B. The ISP has no SLA.
- C. An RPO has not been determined.
- D. There is a single point of failure.
A network team segmented a critical, end-of-life server to a VLAN that can only be reached by specific devices but cannot be reached by the perimeter network. Which of the following best describe the controls the team implemented? (Choose two.)
- A. Managerial
- B. Physical
- C. Corrective
- D. Detective
- E. Compensating
- F. Technical
- G. Deterrent