
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
A threat actor was able to use a username and password to log in to a stolen company mobile device. Which of the following provides the best solution to increase mobile data security on all employees’ company mobile devices?
- A. Application management
- B. Full disk encryption
- C. Remote wipe
- D. Containerization
Which of the following best describes the risk present after controls and mitigating factors have been applied?
A. Residual
B. Operational
C. Inherent
D. Avoided
A software development team asked a security administrator to recommend techniques that should be used to reduce the chances of the software being reverse engineered. Which of the following should the security administrator recommend?
- A. Digitally signing the software
- B. Performing code obfuscation
- C. Limiting the use of third-party libraries
- D. Using compile flags
Which of the following is a possible factor for MFA?
- A. Something you exhibit
- B. Something you have
- C. Somewhere you are
- D. Someone you know
Easy-to-guess passwords led to an account compromise. The current password policy requires at least 12 alphanumeric characters, one uppercase character, one lowercase character, a password history of two passwords, a minimum password age of one day, and a maximum password age of 90 days. Which of the following would reduce the risk of this incident from happening again? (Choose two.)
- A. Increasing the minimum password length to 14 characters.
- B. Upgrading the password hashing algorithm from MD5 to SHA-512.
- C. Increasing the maximum password age to 120 days.
- D. Reducing the minimum password length to ten characters.
- E. Reducing the minimum password age to zero days.
- F. Including a requirement for at least one special character.
A user downloaded software from an online forum. After the user installed the software, the security team observed external network traffic connecting to the user’s computer on an uncommon port. Which of the following is the most likely explanation of this unauthorized connection?
- A. The software had a hidden keylogger.
- B. The software was ransomware.
- C. The user’s computer had a fileless virus.
- D. The software contained a backdoor.
A utility company is designing a new platform that will host all the virtual machines used by business applications. The requirements include:
• A starting baseline of 50% memory utilization
• Storage scalability
• Single circuit failure resilience
Which of the following best meets all of these requirements?
- A. Connecting dual PDUs to redundant power supplies
- B. Transitioning the platform to an IaaS provider
- C. Configuring network load balancing for multiple paths
- D. Deploying multiple large NAS devices for each host
Which of the following best describes a use case for a DNS sinkhole?
- A. Attackers can see a DNS sinkhole as a highly valuable resource to identify a company’s domain structure.
- B. A DNS sinkhole can be used to draw employees away from known-good websites to malicious ones owned by the attacker.
- C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers.
- D. A DNS sinkhole can be set up to attract potential attackers away from a company’s network resources.
An incident analyst finds several image files on a hard disk. The image files may contain geolocation coordinates. Which of the following best describes the type of information the analyst is trying to extract from the image files?
- A. Log data
- B. Metadata
- C. Encrypted data
- D. Sensitive data
Which of the following most likely describes why a security engineer would configure all outbound emails to use S/MIME digital signatures?
- A. To meet compliance standards
- B. To increase delivery rates
- C. To block phishing attacks
- D. To ensure non-repudiation