Practice Free SY0-701 Exam Online Questions
An employee decides to collect PII data from the company’s system for personal use. The employee compresses the data into a single encrypted file before sending the file to their personal email. The security department becomes aware of the attempted misuse and blocks the attachment from leaving the corporate environment.
Which of the following types of employee training would most likely reduce the occurrence of this type of issue? (Select two).
- A . Privacy legislation
- B . Social engineering
- C . Risk management
- D . Company compliance
- E . Phishing
- F . Remote work
A,D
Explanation:
The misuse of personally identifiable information (PII) is often mitigated through employee training on privacy legislation and company compliance. Training on privacy legislation educates employees about legal requirements and consequences related to handling PII, such as GDPR or HIPAA.
Company compliance training reinforces internal policies and procedures regarding data handling, acceptable use, and the repercussions of violations.
While social engineering and phishing training are important for security awareness, they address external threats rather than insider misuse of data. Risk management is a broader discipline focused
on assessing and mitigating organizational risks but does not directly prevent employee misuse through training. Remote work training focuses on secure practices for working outside corporate environments, which is not the core issue here.
This approach aligns with Security Program Management and Oversight principles emphasizing compliance and privacy training to reduce insider threats 【 6:Chapter 16†CompTIA Security+ Study Guide 】 .
An organization plans to expand its operations internationally and needs to keep data at the new location secure. The organization wants to use the most secure architecture model possible.
Which of the following models offers the highest level of security?
- A . Cloud-based
- B . Peer-to-peer
- C . On-premises
- D . Hybrid
A
Explanation:
Cloud-based models provide strong security with features like encryption, redundancy, and disaster recovery, making it a secure choice for international operations.
A company is redesigning its infrastructure and wants to reduce the number of physical servers in use.
Which of the following architectures is best suited for this goal?
- A . Isolation
- B . Segmentation
- C . Virtualization
- D . Redundancy
An office wants to install a Wi-Fi network. The security team must ensure a secure design. The access points will be more powerful and use WPA3 with a 16-character randomized key.
Which of the following should the security team do next?
- A . Create a heat map of the building perimeter.
- B . Deploy IPSec tunnels from each access point to the controller.
- C . Enable WPA2-PSK with a 24-character randomized key.
- D . Disable SSH administration on all access points.
A
Explanation:
Because the organization plans to deploy high-powered wireless access points, the next critical step is to create a heat map of the building perimeter. CompTIA Security+ SY0-701 highlights wireless heat maps as an essential design tool for identifying signal bleed, coverage overlap, dead zones, and areas where wireless signals extend beyond intended boundaries.
Stronger access points increase the risk of signal leakage outside the building, which could allow unauthorized users to attempt connections from parking lots or nearby buildings. A heat map enables the security team to visualize RF propagation and adjust power levels, antenna placement, and access point locations to minimize external exposure while maintaining internal coverage.
Deploying IPSec tunnels (B) is unnecessary for standard WLAN architectures. Enabling WPA2-PSK (C) weakens security compared to WPA3. Disabling SSH administration (D) is a hardening step but does not address wireless coverage risks.
Therefore, the correct next step in secure Wi-Fi design is A: Create a heat map of the building perimeter.
While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website.
Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?
- A . Secure cookies
- B . Input sanitization
- C . Code signing
- D . Blocklist
B
Explanation:
Input sanitization is a critical security measure to prevent SQL injection attacks, which occur when an attacker exploits vulnerabilities in a website’s input fields to execute malicious SQL code. By properly sanitizing and validating all user inputs, developers can prevent malicious code from being executed, thereby securing the website against such attacks.
Reference = CompTIA Security+ SY0-701 study materials, particularly in the domain of web application security and common vulnerability mitigation strategies.
A malicious insider from the marketing team alters records and transfers company funds to a personal account.
Which of the following methods would be the best way to secure company records
in the future?
- A . Permission restrictions
- B . Hashing
- C . Input validation
- D . Access control list
An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned. one of the batch jobs talked and caused a major disruption.
Which of the following would work best to prevent this type of incident from reoccurring?
- A . Job rotation
- B . Retention
- C . Outsourcing
- D . Separation of duties
A
Explanation:
Job rotation is a security control that involves regularly moving employees to different roles within an organization. This practice helps prevent incidents where a single employee has too much control or knowledge about a specific job function, reducing the risk of disruption when an employee leaves. It also helps in identifying any hidden issues or undocumented processes that could cause problems after an employee’s departure.
Reference: CompTIA Security+ SY0-701 Course Content: Domain 5: Security Program Management and Oversight, which includes job rotation as a method to ensure business continuity and reduce risks.
An organization’s web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information.
Which of the following mitigation strategies would be most effective for preventing an attack on the organization’s web servers? (Select two).
- A . Regularly updating server software and patches
- B . Implementing strong password policies
- C . Encrypting sensitive data at rest and in transit
- D . Utilizing a web-application firewall
- E . Performing regular vulnerability scans
- F . Removing payment information from the servers
Which of the following activities is the first stage in the incident response process?
- A . Detection
- B . Declaration
- C . Containment
- D . Vacation
Which of the following would be the best way to block unknown programs from executing?
- A . Access control list
- B . Application allow list.
- C . Host-based firewall
- D . DLP solution
B
Explanation:
An application allow list is a security technique that specifies which applications are permitted to run on a system or a network. An application allow list can block unknown programs from executing by only allowing the execution of programs that are explicitly authorized and verified. An application allow list can prevent malware, unauthorized software, or unwanted applications from running and compromising the security of the system or the network12.
The other options are not the best ways to block unknown programs from executing:
Access control list: This is a security technique that specifies which users or groups are granted or denied access to a resource or an object. An access control list can control the permissions and privileges of users or groups, but it does not directly block unknown programs from executing13.
Host-based firewall: This is a security device that monitors and filters the incoming and outgoing network traffic on a single host or system. A host-based firewall can block or allow network connections based on predefined rules, but it does not directly block unknown programs from executing1.
DLP solution: This is a security system that detects and prevents the unauthorized transmission or leakage of sensitive data. A DLP solution can protect the confidentiality and integrity of data, but it does not directly block unknown programs from executing1.
Reference = 1: CompTIA Security+ SY0-701 Certification Study Guide, page 972: Application Whitelisting C CompTIA Security+ SY0-701 C 3.5, video by Professor Messer3: CompTIA Security+ SY0-701 Certification Study Guide, page 98.: CompTIA Security+ SY0-701 Certification Study Guide, page 99.: CompTIA Security+ SY0-701 Certification Study Guide, page 100.
