Practice Free SY0-701 Exam Online Questions
A company wants to reduce the time and expense associated with code deployment.
Which of the following technologies should the company utilize?
- A . Serverless architecture
- B . Thin clients
- C . Private cloud
- D . Virtual machines
A
Explanation:
Serverless architecture allows companies to deploy code without managing the underlying infrastructure. This approach significantly reduces the time and expense involved in code deployment because developers can focus solely on writing code, while the cloud provider manages the servers, scaling, and maintenance. Serverless computing also enables automatic scaling and pay-per-execution billing, which further optimizes costs.
CompTIA Security+ SY0-701 Course Content: The course covers cloud technologies, including serverless architectures, which are highlighted as a method to streamline and reduce costs associated with code deployment.
Which of the following describes the category of data that is most impacted when it is lost?
- A . Confidential
- B . Public
- C . Private
- D . Critical
A security architect wants to prevent employees from receiving malicious attachments by email.
Which of the following functions should the chosen solution do?
- A . Apply IP address reputation data.
- B . Tap and monitor the email feed.
- C . Scan email traffic inline.
- D . Check SPF records.
A company is considering an expansion of access controls for an application that contractors and internal employees use to reduce costs.
Which of the following risk elements should the implementation team understand before granting access to the application?
- A . Threshold
- B . Appetite
- C . Avoidance
- D . Register
B
Explanation:
Risk appetite refers to the level of risk an organization is willing to accept before implementing security measures. When expanding access controls, the company must assess how much risk is acceptable in terms of data exposure, unauthorized access, and compliance obligations.
Reference: CompTIA Security+ SY0-701 Official Study Guide, Risk Management domain.
An administrator implements web-filtering products but still sees that users are visiting malicious links.
Which of the following configuration items does the security administrator need to review?
- A . Intrusion prevention system
- B . Content categorization
- C . Encryption
- D . DNS service
B
Explanation:
Web-filtering effectiveness heavily relies on content categorization to correctly identify and block access to malicious or inappropriate websites. If users are still visiting malicious links, it is likely that the categorization database or configuration needs updating or correction.
Intrusion prevention systems (A) protect against network attacks but do not filter web content by category. Encryption (C) is unrelated to web filtering, and DNS services (D) assist with domain resolution but do not directly categorize content.
Proper configuration and maintenance of content categorization are essential to effective web filtering, as emphasized in the Security Operations domain of SY0-701 【 6:Chapter 12†CompTIA Security+ Study Guide 】 .
Which of the following security concepts is accomplished with the installation of a RADIUS server?
- A . CIA
- B . AA
- C . ACL
- D . PEM
Which of the following allows a systems administrator to tune permissions for a file?
- A . Patching
- B . Access control list
- C . Configuration enforcement
- D . Least privilege
B
Explanation:
Detailed Access control lists (ACLs) allow administrators to fine-tune file permissions by specifying which users or groups have access to a file and defining the level of access.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 3: Security Architecture, Section: "Access Control Mechanisms".
Which of the following allows a systems administrator to tune permissions for a file?
- A . Patching
- B . Access control list
- C . Configuration enforcement
- D . Least privilege
B
Explanation:
Detailed Access control lists (ACLs) allow administrators to fine-tune file permissions by specifying which users or groups have access to a file and defining the level of access.
Reference: CompTIA Security+ SY0-701 Study Guide, Domain 3: Security Architecture, Section: "Access Control Mechanisms".
Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?
- A . Order of volatility
- B . Preservation of event logs
- C . Chain of custody
- D . Compliance with legal hold
A
Explanation:
When conducting a forensic analysis after an incident, it’s essential to prioritize the data collection process based on the "order of volatility." This principle dictates that more volatile data (e.g., data in memory, network connections) should be captured before less volatile data (e.g., disk drives, logs). The idea is to preserve the most transient and potentially valuable evidence first, as it is more likely to be lost or altered quickly.
CompTIA Security+ SY0-701 Course Content: Domain 04 Security Operations.
CompTIA Security+ SY0-601 Study Guide: Chapter on Digital Forensics.
An administrator needs to perform server hardening before deployment.
Which of the following steps should the administrator take? (Select two).
- A . Disable default accounts.
- B . Add the server to the asset inventory.
- C . Remove unnecessary services.
- D . Document default passwords.
- E . Send server logs to the SIEM.
- F . Join the server to the corporate domain.
