Practice Free SY0-701 Exam Online Questions
Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?
- A . SIEM
- B . WAF
- C . Network taps
- D . IDS
A
Explanation:
A Security Information and Event Management (SIEM) solution collects, aggregates, and correlates logs from multiple sources to detect anomalies and generate alerts. SIEMs are essential for security monitoring and incident detection.: Security+ SY0-701 Course Content, Security+ SY0-601 Book.
A security administrator protects passwords by using hashing.
Which of the following best describes what the administrator is doing?
- A . Adding extra characters at the end to increase password length
- B . Generating a token to make the passwords temporal
- C . Using mathematical algorithms to make passwords unique
- D . Creating a rainbow table to protect passwords in a list
C
Explanation:
Hashing is the process of converting plaintext passwords into a fixed-length, irreversible string using a mathematical algorithm (hash function). This makes each password unique based on its content, and even a small change in the password will produce a different hash. The primary purpose is to ensure that the actual passwords are not stored directly and cannot be easily recovered from the hash, even if the hash is compromised.
Reference: CompTIA Security+ SY0-701 Official Study Guide, Domain 1.3, "Hashing ensures that plaintext passwords are not stored directly. Hash functions use mathematical algorithms to produce unique, fixed-length output for each unique input."
Exam Objectives 1.3: “Explain the importance of cryptographic concepts.”
An employee clicks a malicious link in an email that appears to be from the company’s Chief Executive Officer. The employee’s computer is infected with ransomware that encrypts the company’s files.
Which of the following is the most effective way for the company to prevent similar incidents in the future?
- A . Security awareness training
- B . Database encryption
- C . Segmentation
- D . Reporting suspicious emails
While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website.
Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?
- A . Secure cookies
- B . Input sanitization
- C . Code signing
- D . Blocklist
B
Explanation:
Input sanitization is a critical security measure to prevent SQL injection attacks, which occur when an attacker exploits vulnerabilities in a website’s input fields to execute malicious SQL code. By properly sanitizing and validating all user inputs, developers can prevent malicious code from being executed, thereby securing the website against such attacks.
= CompTIA Security+ SY0-701 study materials, particularly in the domain of web application security and common vulnerability mitigation strategies.
While investigating a recent security breach an analyst finds that an attacker gained access by SOL infection through a company website.
Which of the following should the analyst recommend to the website developers to prevent this from reoccurring?
- A . Secure cookies
- B . Input sanitization
- C . Code signing
- D . Blocklist
B
Explanation:
Input sanitization is a critical security measure to prevent SQL injection attacks, which occur when an attacker exploits vulnerabilities in a website’s input fields to execute malicious SQL code. By properly sanitizing and validating all user inputs, developers can prevent malicious code from being executed, thereby securing the website against such attacks.
= CompTIA Security+ SY0-701 study materials, particularly in the domain of web application security and common vulnerability mitigation strategies.
A company wants to verify that the software the company is deploying came from the vendor the
company purchased the software from.
Which of the following is the best way for the company to confirm this information?
- A . Validate the code signature.
- B . Execute the code in a sandbox.
- C . Search the executable for ASCII strings.
- D . Generate a hash of the files.
A
Explanation:
Validating the code signature is the best way to verify software authenticity, as it ensures that the software has not been tampered with and that it comes from a verified source. Code signatures are digital signatures applied by the software vendor, and validating them confirms the software’s integrity and origin.: CompTIA Security+ SY0-701 course content and official CompTIA study resources.
An organization wants to donate its aging network hardware.
Which of the following should the organization perform to prevent any network details from leaking?
- A . Destruction
- B . Sanitization
- C . Certification
- D . Data retention
B
Explanation:
Sanitization is the process of thoroughly removing or wiping all data from devices before disposal or donation to prevent sensitive information from being recovered or leaked.
Reference: CompTIA Security+ SY0-701 Official Study Guide, Domain 4.4: "Sanitization is used to ensure data cannot be recovered from donated or decommissioned equipment."
Exam Objectives 4.4: “Summarize business continuity and disaster recovery concepts.”
A systems administrator is concerned users are accessing emails through a duplicate site that is not run by the company.
Which of the following is used in this scenario?
- A . Impersonation
- B . Replication
- C . Phishing
- D . Smishing
A company is working with a vendor to perform a penetration test.
Which of the following includes an estimate about the number of hours required to complete the engagement?
- A . SOW
- B . BPA
- C . SLA
- D . NDA
A
Explanation:
A statement of work (SOW) is a document that defines the scope, objectives, deliverables, timeline, and costs of a project or service. It typically includes an estimate of the number of hours required to complete the engagement, as well as the roles and responsibilities of the parties involved. A SOW is often used for penetration testing projects to ensure that both the client and the vendor have a clear and mutual understanding of what is expected and how the work will be performed. A business partnership agreement (BPA), a service level agreement (SLA), and a non-disclosure agreement (NDA) are different types of contracts that may be related to apenetration testing project, but they do not include an estimate of the number of hours required to complete the engagement.: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 492;.
What to Look For in a Penetration Testing Statement of Work?
Which of the following is the main consideration when a legacy system that is a critical part of a company’s infrastructure cannot be replaced?
- A . Resource provisioning
- B . Cost
- C . Single point of failure
- D . Complexity
