
Pass CompTIA Security+ SY0-701 in Just 3 Days – Stress-Free!
Get your Security+ SY0-701 certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
While a user reviews their email, a host gets infected by malware that came from an external hard drive plugged into the host. The malware steals all the user’s credentials stored in the browser. Which of the following training topics should the user review to prevent this situation from reoccurring?
A. Operational security
B. Social engineering
C. Removable media and cables
D. Password management
Which of the following analysis methods allows an organization to measure the exposure factor associated with organizational assets?
- A. Trend-based
- B. Quantitative
- C. User-driven
- D. Heuristic
An organization has decided that devices connected to on-premises networks must meet specific requirements related to OS patch level, antivirus version, and device types before being able to access internal
resources. Which of the following solutions will the organization most likely implement?
- A. XDR
- B. DMARC
- C.EDR
- D.NAC
Which of the following attacks exploits a potential vulnerability as a result of using weak cryptographic algorithms?
- A. Password cracking
- B. On-path
- C. Digital signing
- D. Side-channel
A user is receiving an account is locked out” error message when trying to log in to a laptop. Authentication logs reveal the following messages:
[10:00:00 AM] Login rejected – username janith – password Monday1
[10:00:01 AM] Login rejected – username janith – password Monday2
[10:00:01 AM] Login rejected – username janith – password Monday3
[10:00:02 AM] Login rejected – username janith – password Monday4
[10:00:03 AM] Login rejected – username janith – password Monday5
Which of the following attacks is currently occurring?
- A. Directory traversal
- B. Brute-force
- C. DDoS
- D. Privilege escalation
In an effort to reduce costs, a company is implementing a strategy that gives employees access to internal company resources, including email, from personal devices. Which of the following strategies is the company implementing?
- A. COPE
- B. CYOD
- C.BYOD
- D. MDM
A systems administrator needs to update systems without disrupting operations. Which of the followina should the systems administrator and company leadership agree upon?
- A. Backout plan
- B. Impact analysis
- C. Maintenance window
- D. Standard operating procedure
A company is increasing its security standards and wants to monitor and record authorized access. Which of the following should the company implement to best meet these requirements?
- A. CCTV
- B. Gate guards
- C. Smart cards
- D. Fencing
A company sets up strict access controls for sensitive data. Employees in different departments have different levels of access, and managers must approve all requests. Which of the following describes this type of access control?
- A. Mandatory
- B. Attribute-based
- C. Role-based
- D. Discretionary