
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
While conducting a business continuity tabletop exercise, the security team becomes concerned by potential impact if a generator was to develop a fault during failover. Which of the following is the team most likely to consider in regard to risk management activities?
- A. RPO
- B. ARO
- C. BIA
- D. MTTR
Which of the following is prevented by proper data sanitization?
- A. Hackers’ ability to obtain data from used hard drives
- B. Devices reaching end-of-life and losing support
- C. Disclosure of sensitive data through incorrect classification
- D. Incorrect inventory data leading to a laptop shortage
A certificate authority needs to post information about expired certificates. Which of the following would accomplish this task?
- A. TPM
- B. CRL
- C. PKI
- D. CSR
Which of the following can best contribute to prioritizing patch applications?
A. CVSS
B. SCAP
C. OSINT
D. CVE
A systems administrator creates a script that validates OS version, patch levels, and installed applications when users log in. Which of the following examples best describes the purpose of this script?
- A. Resource scaling
- B. Policy enumeration
- C. Baseline enforcement
- D. Guard rails implementation
A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?
- A. Endpoint
- B. Application
- C. Firewall
- D. NAC
A company’s gate access logs show multiple entries from an employee’s ID badge within a two-minute period. Which of the following is this an example of?
- A. RFID cloning
- B. Side-channel attack
- C. Shoulder surfing
- D. Tailgating
Which of the following most accurately describes the order in which a security engineer should implement secure baselines?
A. Deploy, maintain, establish
B. Establish, maintain, deploy
C. Establish, deploy, maintain
D. Deploy, establish, maintain
A SOC analyst establishes a remote control session on an end user’s machine and discovers the following in a file:
gmail.com[ENT]my.name@gmail.com[ENT]NoOneCanGuessThis123! [ENT]Hello Susan, it was great to see you the other day! Let’s plan a followup[BACKSPACE]follow-up meeting soon. Here is the link to register. [RTN][CTRL]c [CTRL]v [RTN]after[BACKSPACE]After you register give me a call on my cellphone.
Which of the following actions should the SOC analyst perform first?
- A. Advise the user to change passwords.
- B. Reimage the end user’s machine.
- C. Check the policy on personal email at work.
- D. Check host firewall logs.
Which of the following is a reason environmental variables are a concern when reviewing potential system vulnerabilities?
- A. The contents of environmental variables could affect the scope and impact of an exploited vulnerability.
- B. In-memory environmental variable values can be overwritten and used by attackers to insert malicious code.
- C. Environmental variables define cryptographic standards for the system and could create vulnerabilities if deprecated algorithms are used.
- D. Environmental variables will determine when updates are run and could mitigate the likelihood of vulnerability exploitation.