Practice Free SY0-701 Exam Online Questions
A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added.
Which of the following would be the best solution to meet these objectives?
- A . Load balancing
- B . Fault tolerance
- C . Proxy servers
- D . Replication
A
Explanation:
Detailed Load balancing improves application availability by distributing traffic across multiple servers. If one server fails, traffic is automatically routed to other available servers with minimal intervention.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 3: Security Architecture, Section: "High Availability Solutions".
An employee decides to collect PII data from the company’s system for personal use. The employee compresses the data into a single encrypted file before sending the file to their personal email. The security department becomes aware of the attempted misuse and blocks the attachment from leaving the corporate environment.
Which of the following types of employee training would most likely reduce the occurrence of this type of issue? (Select two).
- A . Privacy legislation
- B . Social engineering
- C . Risk management
- D . Company compliance
- E . Phishing
- F . Remote work
A, D
Explanation:
The misuse of personally identifiable information (PII) is often mitigated through employee training on privacy legislation and company compliance. Training on privacy legislation educates employees about legal requirements and consequences related to handling PII, such as GDPR or HIPAA.
Company compliance training reinforces internal policies and procedures regarding data handling, acceptable use, and the repercussions of violations.
While social engineering and phishing training are important for security awareness, they address external threats rather than insider misuse of data. Risk management is a broader discipline focused on assessing and mitigating organizational risks but does not directly prevent employee misuse through training. Remote work training focuses on secure practices for working outside corporate environments, which is not the core issue here.
This approach aligns with Security Program Management and Oversight principles emphasizing compliance and privacy training to reduce insider threats 【 6:Chapter 16†CompTIA Security+ Study Guide 】 .
After a security incident, a systems administrator asks the company to buy a NAC platform.
Which of the following attack surfaces is the systems administrator trying to protect?
- A . Bluetooth
- B . Wired
- C . NFC
- D . SCADA
B
Explanation:
A NAC (network access control) platform is a technology that enforces security policies on devices that attempt to access a network. A NAC platform can verify the identity, role, and compliance of the devices, and grant or deny access based on predefined rules. A NAC platform can protect both wired and wireless networks, but in this scenario, the systems administrator is trying to protect the wired attack surface, which is the set of vulnerabilities that can be exploited through a physical connection to the network12.
Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 5, page 189; CompTIA Security+ Certification Kit: Exam SY0-701, 7th Edition, Chapter 5, page 237.
Which of the following is a qualitative approach to risk analysis?
- A . Including the MTTR and MTBF as part of the risk assessment
- B . Tracking and documenting network risks using a risk register
- C . Assigning a level of high, medium, or low to the risk rating
- D . Using ALE and ARO to help determine whether a risk should be mitigated
C
Explanation:
A qualitative risk analysis assigns descriptive ratings such as high, medium, or low to risks based on their likelihood and impact without numerical calculations.
Including MTTR/MTBF (A) and ALE/ARO (D) are quantitative methods using metrics. Risk registers (B) document risks but don’t specify analysis type.
Qualitative and quantitative risk methods are fundamental in SY0-701 risk management 【 6:Chapter 17†CompTIA Security+ Study Guide 】 .
A business needs a recovery site but does not require immediate failover. The business also wants to reduce the workload required to recover from an outage.
Which of the following recovery sites is the best option?
- A . Hot
- B . Cold
- C . Warm
- D . Geographically dispersed
C
Explanation:
A warm site is the best option for a business that does not require immediate failover but wants to reduce the workload required for recovery. A warm site has some pre-installed equipment and data, allowing for quicker recovery than a cold site, but it still requires some setup before becoming fully operational.
Hot sites provide immediate failover but are more expensive and require constant maintenance. Cold sites require significant time and effort to get up and running after an outage. Geographically dispersed sites refer to a specific location strategy rather than the readiness of the recovery site.
A security administrator receives multiple reports about the same suspicious email.
Which of the following is the most likely reason for the malicious email’s continued delivery?
- A . Employees are flagging legitimate emails as spam.
- B . Information from reported emails is not being used to tune email filtering tools.
- C . Employees are using shadow IT solutions for email.
- D . Employees are forwarding personal emails to company email addresses.
B
Explanation:
If email filtering tools are not tuned based on reported emails, malicious emails will continue to bypass filters. Effective filtering depends on feedback and updating rules with real threat data. Flagging legitimate emails (A) would cause false positives, shadow IT (C) and forwarding personal emails (D) are less relevant to the filtering bypass.
Tuning email filters is part of continuous Security Operations processes 【 6:Chapter 14†CompTIA Security+ Study Guide 】 .
Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach that would affect offshore offices.
Which of the following is this an example of?
- A . Tabletop exercise
- B . Penetration test
- C . Geographic dispersion
- D . Incident response
A
Explanation:
A tabletop exercise is a discussion-based simulation in which stakeholders review and talk through their roles, responsibilities, and actions in response to a hypothetical incident. This allows participants to evaluate and improve response plans without actual disruption.
Reference: CompTIA Security+ SY0-701 Official Study Guide, Domain 5.6: "Tabletop exercises involve key stakeholders discussing roles, responsibilities, and actions in response to simulated incidents." Exam Objectives 5.6: “Given a scenario, implement security incident management processes.”
Which of the following describes the category of data that is most impacted when it is lost?
- A . Confidential
- B . Public
- C . Private
- D . Critical
A systems administrator just purchased multiple network devices.
Which of the following should the systems administrator perform to prevent attackers from accessing the devices by using publicly available information?
- A . Install endpoint protection
- B . Disable ports/protocols
- C . Change default passwords
- D . Remove unnecessary software
C
Explanation:
Changing default passwords is a critical first step after acquiring new devices. Default credentials are widely known and publicly documented, so changing them prevents unauthorized access using this information.
Reference: CompTIA Security+ SY0-701 Official Study Guide, Domain 3.1: "Changing default passwords prevents attackers from exploiting publicly available device information."
Exam Objectives 3.1: “Implement secure network architecture concepts.”
An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period.
Which of the following data policies is the administrator carrying out?
- A . Compromise
- B . Retention
- C . Analysis
- D . Transfer
- E . Inventory
B
Explanation:
A data retention policy is a set of rules that defines how long data should be stored and when it should be deleted or archived. An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period by following the data retention policy of the organization. This policy helps the organization to comply with legal and regulatory requirements, optimize storage space, and protect data privacy and security.
Reference
CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, Chapter 3, Section 3.4, page 1211
CompTIA Security+ Practice Tests: Exam SY0-701, 3rd Edition, Chapter 3, Question 15, page 832