Practice Free SY0-701 Exam Online Questions
An administrator discovers a cross-site scripting vulnerability on a company website.
Which of the following will most likely remediate the issue?
- A . Input validation
- B . NGFW
- C . Vulnerability scan
- D . WAF
A
Explanation:
Cross-site scripting (XSS) occurs when a web application fails to properly validate or sanitize user input, allowing attackers to inject malicious scripts into web pages viewed by other users. The most effective remediation is input validation, which ensures that only safe, expected data is accepted by the application.
Security+ SY0-701 highlights input validation as a primary defense against:
XSS
SQL injection
Command injection
Path traversal attacks
By validating and sanitizing input at both the client and server layers, organizations can strip harmful characters, block script tags, enforce strict data types, and ensure proper encoding.
A NGFW (B) or WAF (D) can mitigate attacks by blocking malicious payloads, but they do not fix the root cause within the web application. A vulnerability scan (C) identifies the issue but does not remediate it.
Therefore, only input validation (A) directly resolves the underlying coding flaw responsible for XSS.
A technician wants to improve the situational and environmental awareness of existing users as they transition from remote to in-office work.
Which of the following is the best option?
- A . Send out periodic security reminders.
- B . Update the content of new hire documentation.
- C . Modify the content of recurring training.
D Implement a phishing campaign
C
Explanation:
Recurring training is a type of security awareness training that is conducted periodically to refresh and update the knowledge and skills of the users. Recurring training can help improve the situational and environmental awareness of existing users as they transition from remote to in-office work, as it can cover the latest threats, best practices, and policies that are relevant to their work environment. Modifying the content of recurring training can ensure that the users are aware of the current security landscape and the expectations of their roles. = CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701, 9th Edition, Chapter 5, page 232. CompTIA Security+ (SY0-701) Certification Exam Objectives, Domain 5.1, page 18.
Which of the following would be the greatest concern for a company that is aware of the consequences of non-compliance with government regulations?
- A . Right to be forgotten
- B . Sanctions
- C . External compliance reporting
- D . Attestation
B
Explanation:
Detailed
Sanctions imposed for non-compliance can include fines, legal actions, and loss of business licenses. These pose a significant financial and reputational risk to organizations.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: "Regulatory Compliance Risks".
Which of the following would be most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk?
- A . ARO
- B . RTO
- C . RPO
- D . ALE
- E . SLE
D
Explanation:
The Annual Loss Expectancy (ALE) is most useful in determining whether the long-term cost to transfer a risk is less than the impact of the risk. ALE is calculated by multiplying the SingleLoss Expectancy (SLE) by the Annualized Rate of Occurrence (ARO), which provides an estimate of the annual expected loss due to a specific risk, making it valuable for long-term financial planning and risk management decisions.: CompTIA Security+ SY0-701 course content and official CompTIA study resources.
Which of the following activities should be performed first to compile a list of vulnerabilities in an environment?
- A . Automated scanning
- B . Penetration testing
- C . Threat hunting
- D . Log aggregation
- E . Adversarial emulation
A
Explanation:
Automated vulnerability scanning is the first step in identifying system weaknesses. These scans systematically check for outdated software, misconfigurations, and known vulnerabilities in a network.
Penetration testing (B)is conducted after vulnerabilities are identified.
Threat hunting (C)focuses on detecting unknown threats, not listing vulnerabilities.
Reference: CompTIA Security+ SY0-701 Official Study Guide, Security Operations domain.
A security administrator receives multiple reports about the same suspicious email.
Which of the following is the most likely reason for the malicious email’s continued delivery?
- A . Employees are flagging legitimate emails as spam.
- B . Information from reported emails is not being used to tune email filtering tools.
- C . Employees are using shadow IT solutions for email.
- D . Employees are forwarding personal emails to company email addresses.
B
Explanation:
If email filtering tools are not tuned based on reported emails, malicious emails will continue to bypass filters. Effective filtering depends on feedback and updating rules with real threat data.
Flagging legitimate emails (A) would cause false positives, shadow IT (C) and forwarding personal emails (D) are less relevant to the filtering bypass.
Tuning email filters is part of continuous Security Operations processes 【 6:Chapter 14†CompTIA Security+ Study Guide 】 .
Several employees received a fraudulent text message from someone claiming to be the Chief
Executive Officer (CEO).
The message stated:
“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”
Which of the following are the best responses to this situation? (Choose two).
- A . Cancel current employee recognition gift cards.
- B . Add a smishing exercise to the annual company training.
- C . Issue a general email warning to the company.
- D . Have the CEO change phone numbers.
- E . Conduct a forensic investigation on the CEO’s phone.
- F . Implement mobile device management.
B,C
Explanation:
This situation is an example of smishing, which is a type of phishing that uses text messages (SMS) to entice individuals into providing personal or sensitive information to cybercriminals. The best responses to this situation are to add a smishing exercise to the annual company training and to issue a general email warning to the company. A smishing exercise can help raise awareness and educate employees on how to recognize and avoid smishing attacks. An email warning can alert employees to the fraudulent text message and remind them to verify the identity and legitimacy of any requests for information or money. =.
What Is Phishing | Cybersecurity | CompTIA, Phishing C SY0-601 CompTIA Security+: 1.1 – Professor Messer IT Certification Training Courses
An administrator is installing an SSL certificate on a new system. During testing, errors indicate that the certificate is not trusted. The administrator has verified with the issuing CA and has validated the
private key.
Which of the following should the administrator check for next?
- A . If the wildcard certificate is configured
- B . If the certificate signing request is valid
- C . If the root certificate is installed
- D . If the public key is configured
Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
- A . Key stretching
- B . Data masking
- C . Steganography
- D . Salting
D
Explanation:
Salting is the process of adding extra random data to a password or other data before applying a one-way data transformation algorithm, such as a hash function. Salting increases the complexity and randomness of the input data, making it harder for attackers to guess or crack the original data using precomputed tables or brute force methods. Salting also helps prevent identical passwords from producing identical hash values, which could reveal the passwords to attackers who have access to the hashed data. Salting is commonly used to protect passwords stored in databases or transmitted over networks. =
Passwords technical overview
Encryption, hashing, salting C what’s the difference?
Salt (cryptography)
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned. one of the batch jobs talked and caused a major disruption.
Which of the following would work best to prevent this type of incident from reoccurring?
- A . Job rotation
- B . Retention
- C . Outsourcing
- D . Separation of duties
A
Explanation:
Job rotation is a security control that involves regularly moving employees to different roles within an organization. This practice helps prevent incidents where a single employee has too much control or knowledge about a specific job function, reducing the risk of disruption when an employee leaves. It also helps in identifying any hidden issues or undocumented processes that could cause problems after an employee’s departure.
CompTIA Security+ SY0-701 Course Content: Domain 5: Security Program Management and Oversight, which includes job rotation as a method to ensure business continuity and reduce risks.
