
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
A security analyst wants to better understand the behavior of users and devices in order to gain visibility into potential malicious activities. The analyst needs a control to detect when actions deviate from a common baseline. Which of the following should the analyst use?
- A. Intrusion prevention system
- B. Sandbox
- C. Endpoint detection and response
- D. Antivirus
A legal department must maintain a backup from all devices that have been shredded and recycled by a third party. Which of the following best describes this requirement?
- A. Data retention
- B. Certification
- C. Sanitization
- D. Destruction
Which of the following can be used to compromise a system that is running an RTOS?
- A. Cross-site scripting
- B. Memory injection
- C. Replay attack
- D. Ransomware
Which of the following threat actors would most likely deface the website of a high-profile music group?
- A. Unskilled attacker
- B. Organized crime
- C. Nation-state
- D. Insider threat
A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?
- A. Apply IP address reputation data.
- B. Tap and monitor the email feed.
- C. Scan email traffic inline.
- D. Check SPF records.
Which of the following activities is the first stage in the incident response process?
- A. Detection
- B. Declaration
- C. Containment
- D. Verification
Which of the following is the main consideration when a legacy system that is a critical part of a company’s infrastructure cannot be replaced?
- A. Resource provisioning
- B. Cost
- C. Single point of failure
- D. Complexity
Which of the following is a compensating control for providing user access to a high-risk website?
- A. Enabling threat prevention features on the firewall
- B. Configuring a SIEM tool to capture all web traffic
- C. Setting firewall rules to allow traffic from any port to that destination
- D. Blocking that website on the endpoint protection software
An organization is implementing a COPE mobile device management policy. Which of the following should the organization include in the COPE policy? (Choose two.)
- A. Remote wiping of the device
- B. Data encryption
- C. Requiring passwords with eight characters
- D. Data usage caps
- E. Employee data ownership
- F. Personal application store access
A security administrator observed the following in a web server log while investigating an incident:
![]()
Which of the following attacks did the security administrator most likely see?
- A. Privilege escalation
- B. Credential replay
- C. Brute force
- D. Directory traversal