
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
During a recent company safety stand-down, the cyber-awareness team gave a presentation on the importance of cyber hygiene. One topic the team covered was best practices for printing centers. Which of the following describes an attack method that relates to printing centers?
- A. Whaling
- B. Credential harvesting
- C. Prepending
- D. Dumpster diving
Which of the following considerations is the most important regarding cryptography used in an IoT device?
- A. Resource constraints
- B. Available bandwidth
- C. The use of block ciphers
- D. The compatibility of the TLS version
A coffee shop owner wants to restrict internet access to only paying customers by prompting them for a receipt number. Which of the following is the best method to use given this requirement?
- A. WPA3
- B. Captive portal
- C. PSK
- D. IEEE 802.1X
While performing digital forensics, which of the following is considered the most volatile and should have the contents collected first?
- A. Hard drive
- B. RAM
- C. SSD
- D. Temporary files
A hosting provider needs to prove that its security controls have been in place over the last six months and have sufficiently protected customer data. Which of the following would provide the best proof that the hosting provider has met the requirements?
- A. NIST CSF
- B. SOC 2 Type 2 report
- C. CIS Top 20 compliance reports
- D. Vulnerability report
A city municipality lost its primary data center when a tornado hit the facility. Which of the following should the city staff use immediately after the disaster to handle essential public services?
- A. BCP
- B. Communication plan
- C. DRP
- D. IRP
Which of the following is considered a preventive control?
- A. Configuration auditing
- B. Log correlation
- C. Incident alerts
- D. Segregation of duties
A company wants to build a new website to sell products online. The website will host a storefront application that will allow visitors to add products to a shopping cart and pay for the products using a credit card. Which of the following protocols would be the MOST secure to implement?
- A. SSL
- B. SFTP
- C. SNMP
- D. TLS
A security team has been alerted to a flood of incoming emails that have various subject lines and are addressed to multiple email inboxes. Each email contains a URL shortener link that is redirecting to a dead domain. Which of the following is the best step for the security team to take?
- A. Create a blocklist for all subject lines.
- B. Send the dead domain to a DNS sinkhole.
- C. Quarantine all emails received and notify all employees.
- D. Block the URL shortener domain in the web proxy.
A security administrator is working to secure company data on corporate laptops in case the laptops are stolen. Which of the following solutions should the administrator consider?
- A. Disk encryption
- B. Data loss prevention
- C. Operating system hardening
- D. Boot security