
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Which of the following is a preventive physical security control?
A. Video surveillance system
B. Bollards
C. Alarm system
D. Motion sensors
Which of the following is most likely to be used as a just-in-time reference document within a security operations center?
- A. Change management policy
- B. Risk profile
- C. Playbook
- D. SIEM profile
A security engineer configured a remote access VPN. The remote access VPN allows end users to connect to the network by using an agent that is installed on the endpoint, which establishes an encrypted tunnel. Which of the following protocols did the engineer most likely implement?
- A. GRE
- B. IPSec
- C. SD-WAN
- D. EAP
Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees’ normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?
- A. UBA
- B. EDR
- C. NAC
- D. DLP
Several customers want an organization to verify its security controls are operating effectively and have requested an independent opinion. Which of the following is the most efficient way to address these requests?
- A. Hire a vendor to perform a penetration test
- B. Perform an annual self-assessment.
- C. Allow each client the right to audit
- D. Provide a third-party attestation report
A university employee logged on to the academic server and attempted to guess the system administrators’ log-in credentials. Which of the following security measures should the university have implemented to detect the employee’s attempts to gain access to the administrators’ accounts?
- A. Two-factor authentication
- B. Firewall
- C. Intrusion prevention system
- D. User activity logs
Which of the following consequences would a retail chain most likely face from customers in the event the retailer is non-compliant with PCI DSS?
- A. Contractual impacts
- B. Sanctions
- C. Fines
- D. Reputational damage
A security analyst is reviewing logs and discovers the following:
![]()
Which of the following should be used to best mitigate this type of attack?
- A. Input sanitization
- B. Secure cookies
- C. Static code analysis
- D. Sandboxing
An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the private key. Which of the following should the administrator check for next?
- A. If the wildcard certificate is configured
- B. If the certificate signing request is valid
- C. If the root certificate is installed
- D. If the public key is configured
An employee emailed a new systems administrator a malicious web link and convinced the administrator to change the email server’s password. The employee used this access to remove the mailboxes of key personnel. Which of the following security awareness concepts would help prevent this threat in the future?
- A. Recognizing phishing
- B. Providing situational awareness training
- C. Using password management
- D. Reviewing email policies