
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Which of the following strategies should an organization use to efficiently manage and analyze multiple types of logs?
- A. Deploy a SIEM solution
- B. Create custom scripts to aggregate and analyze logs.
- C. Implement EDR technology.
- D. Install a unified threat management appliance.
A new security regulation was announced that will take effect in the coming year. A company must comply with it to remain in business. Which of the following activities should the company perform next?
- A. Gap analysis
- B. Policy review
- C. Security procedure evaluation
- D. Threat scope reduction
An accountant is transferring information to a bank over FTP. Which of the following mitigations should the accountant use to protect the confidentiality of the data?
- A. Tokenization
- B. Data masking
- C. Encryption
- D. Obfuscation
An organization has recently decided to implement SSO. The requirements are to leverage access tokens and focus on application authorization rather than user authentication. Which of the following solutions would the engineering team most likely configure?
- A. LDAP
- B. Federation
- C. SAML
- D. OAuth
Which of the following would most likely be used by attackers to perform credential harvesting?
- A. Social engineering
- B. Supply chain compromise
- C. Third-party software
- D. Rainbow table
A security engineer would like to enhance the use of automation and orchestration within the SIEM. Which of the following would be the primary benefit of this enhancement?
- A. It increases complexity.
- B. It removes technical debt.
- C. It adds additional guard rails.
- D. It acts as a workforce multiplier.
A systems administrator receives an alert that a company’s internal file server is very slow and is only working intermittently. The systems administrator reviews the server management software and finds the following information about the server:
![]()
Which of the following indicators most likely triggered this alert?
- A. Concurrent session usage
- B. Network saturation
- C. Account lockout
- D. Resource consumption
Which of the following data states applies to data that is being actively processed by a database server?
- A. In use
- B. At rest
- C. In transit
- D. Being hashed
Which of the following architectures is most suitable to provide redundancy for critical business processes?
- A. Network-enabled
- B. Server-side
- C. Cloud-native
- D. Multitenant
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?
- A. Bluetooth
- B. Wired
- C. NFC
- D. SCADA