
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Which of the following steps in the risk management process involves establishing the scope and potential risks involved with a project?
- A. Risk assessment
- B. Risk identification
- C. Risk treatment
- D. Risk monitoring and review
A company’s website is www.company.com. Attackers purchased the domain www.c0mpany.com. Which of the following types of attacks describes this example?
- A. Typosquatting
- B. Brand impersonation
- C. On-path
- D. Watering-hole
Which of the following allows a systems administrator to tune permissions for a file?
- A. Patching
- B. Access control list
- C. Configuration enforcement
- D. Least privilege
Which of the following would be the greatest concern for a company that is aware of the consequences of non-compliance with government regulations?
Options:
A. Right to be forgotten
B. Sanctions
C. External compliance reporting
D. Attestation
Which of the following security concepts is accomplished when granting access after an individual has logged into a computer network?
- A. Authorization
- B. Identification
- C. Non-repudiation
- D. Authentication
A growing organization, which hosts an externally accessible application, adds multiple virtual servers to improve application performance and decrease the resource usage on individual servers. Which of the following solutions is the organization most likely to employ to further increase performance and availability?
A. Load balancer
B. Jump server
C. Proxy server
D. SD-WAN
A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company. Which of the following is used in this scenario?
- A. Impersonation
- B. Replication
- C. Phishing
- D. Smishing
A security engineer at a large company needs to enhance IAM in order to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?
- A. Role-based
- B. Time-of-day restrictions
- C. Least privilege
- D. Biometric authentication
A company wants to ensure employees are allowed to copy files from a virtual desktop during the workday but are restricted during non-working hours. Which of the following security measures should the company set up?
- A. Digital rights management
- B. Role-based access control
- C. Time-based access control
- D. Network access control
Employees sign an agreement that restricts specific activities when leaving the company. Violating the agreement can result in legal consequerces. Which of the following agreements does this best describe?
A. SLA
B. BPA
C. NDA
D. MOA