
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
While reviewing logs, a security administrator identifies the following code:

Which of the following best describes the vulnerability being exploited?
- A. XSS
- B. SQLi
- C. DDoS
- D. CSRF
A security administrator is evaluating remote access solutions for employees who are geographically dispersed. Which of the following would provide the MOST secure remote access? (Choose two.)
- A. IPSec
- B. SFTP
- C. SRTP
- D. LDAPS
- E. S/MIME
- F. SSL VPN
Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?
- A. SIEM
- B. WAF
- C. Network taps
- D. IDS
Which of the following provides the best protection against unwanted or insecure communications to and from a device?
- A. System hardening
- B. Host-based firewall
- C. Intrusion detection system
- D. Anti-malware software
Which of the following is the primary purpose of a service that tracks log-ins and time spent using the service?
- A. Availability
- B. Accounting
- C. Authentication
- D. Authorization
An employee who was working remotely lost a mobile device containing company data. Which of the following provides the best solution to prevent future data loss?
- A. MDM
- B. DLP
- C. FDE
- D. EDR
An IT administrator needs to ensure data retention standards are implemented on an enterprise application. Which of the following describes the administrator’s role?
- A. Processor
- B. Custodian
- C. Privacy officer
- D. Owner
A company plans to secure its systems by:
• Preventing users from sending sensitive data over corporate email
• Restricting access to potentially harmful websites
Which of the following features should the company set up? (Choose two.)
- A. DLP software
- B. DNS filtering
- C. File integrity monitoring
- D. Stateful firewall
- E. Guardrails
- F. Antivirus signatures
A company processes and stores sensitive data on its own systems. Which of the following steps should the company take first to ensure compliance with privacy regulations?
- A. Implement access controls and encryption.
- B. Develop and provide training on data protection policies.
- C. Create incident response and disaster recovery plans.
- D. Purchase and install security software.
Which of the following cryptographic methods is preferred for securing communications with limited computing resources?
- A. Hashing algorithm
- B. Public key infrastructure
- C. Symmetric encryption
- D. Elliptic curve cryptography