
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
A systems administrator just purchased multiple network devices. Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?
- A. Install endpoint protection.
- B. Disable ports/protocols.
- C. Change default passwords.
- D. Remove unnecessary software.
A marketing coordinator is trying to access a social media application on a company laptop but is getting blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should a security analyst review to determine whether accessing social media applications on a company device is permitted?
- A. Incident response policy
- B. Business continuity policy
- C. Change management policy
- D. Acceptable use policy
Which of the following activities uses OSINT?
- A. Social engineering testing
- B. Data analysis of logs
- C. Collecting evidence of malicious activity
- D. Producing IOC for malicious artifacts
Which of the following are the best security controls for controlling on-premises access? (Select two).
- A. Swipe card
- B. Picture ID
- C. Phone authentication application
- D. Biometric scanner
- E. Camera
- F. Memorable question
A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs. Which of the following risk elements should the implementation team understand before granting access to the application?
- A. Threshold
- B. Appetite
- C. Avoidance
- D. Register
Which of the following is the act of proving to a customer that software developers are trained on secure coding?
- A. Assurance
- B. Contract
- C. Due diligence
- D. Attestation
An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?
- A. Application server
- B. Jump server
- C. RDP server
- D. Proxy server
A security analyst notices unusual behavior on the network. The IDS on the network was not able to detect the activities. Which of the following should the security analyst use to help the IDS detect such attacks in the future?
- A. Signatures
- B. Trends
- C. Honeypot
- D. Reputation
To which of the following security categories does an EDR solution belong?
- A. Physical
- B. Operational
- C. Managerial
- D. Technical
A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company’s reliance on open-source libraries?
- A. Buffer overflow
- B. SQL injection
- C. Cross-site scripting
- D. Zero-day