
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
A company evaluates several options that would allow employees to have remote access to the network. The security team wants to ensure the solution includes AAA to comply with internal security policies. Which of the following should the security team recommend?
- A. IPSec with RADIUS
- B. RDP connection with LDAPS
- C. Web proxy for all remote traffic
- D. Jump server with 802.1X
An administrator must replace an expired SSL certificate. Which of the following does the administrator need to create the new SSL certificate?
- A. CSR
- B. OCSP
- C. Key
- D. CRL
A systems administrator receives a text message from an unknown number claiming to be the Chief Executive Officer of the company. The message states an emergency situation requires a password reset. Which of the following threat vectors is being used?
- A. Typosquatting
- B. Smishing
- C. Pretexting
- D. Impersonation
A Chief Information Security Officer (CISO) wants to:
• Prevent employees from downloading malicious content.
• Establish controls based on departments and users.
• Map internet access for business applications to specific service accounts.
• Restrict content based on categorization.
Which of the following should the CSO implement?
- A. Web application firewall
- B. Secure DNS server
- C. Jump server
- D. Next-generation firewall
A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?
- A. Exemption
- B. Exception
- C. Avoid
- D. Transfer
A security analyst needs to improve the company’s authentication policy following a password audit. Which of the following should be included in the policy? (Choose two.)
- A. Length
- B. Complexity
- C. Least privilege
- D. Something you have
- E. Security keys
- F. Biometrics
Which of the following is the best way to provide secure remote access for employees while minimizing the exposure of a company’s internal network?
- A. VPN
- B. LDAP
- C. FTP
- D. RADIUS
The security team at a large global company needs to reduce the cost of storing data used for performing investigations. Which of the following types of data should have its retention length reduced?
- A. Packet capture
- B. Endpoint logs
- C. OS security logs
- D. Vulnerability scan
Which of the following would most likely be a hacktivists motive?
- A. Revenge
- B. Financial gain
- C. Espionage
- D. Philosophical beliefs
ACVE in a key back-end component of an application has been discloseD. The systems administrator is identifying all of the systems in the environment that are susceptible to this risk. which of the following should the systems administrator perform?
- A. Automated reporting
- B. Packet capture
- C. Vulnerability scan
- D. Metadata analysis