
CompTIA Security+ SY0-701
Quiz
•
Professional Development
•
Professional Development
•
Practice Problem
•
Hard
Jomesh Joseph Veliyath
Used 21+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL, https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following tools is effective in preventing a user from accessing unauthorized removable media?
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements?
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A security analyst is reviewing application logs to determine the source of a breach and locates the following log: https://www.comptia.com/login.php?id='%20or%20'1'1='1 Which of the following has been observed?
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Pre and Post Test
Quiz
•
Professional Development
10 questions
POST TEST NEW PARADIGM
Quiz
•
Professional Development
15 questions
Anatomia capilar
Quiz
•
Professional Development
10 questions
Pre & Post Test QCC
Quiz
•
Professional Development
10 questions
Experiencia del cliente ágil
Quiz
•
Professional Development
14 questions
Mô đun 6: Xây dựng Văn hóa nhà trường Tiểu học.
Quiz
•
Professional Development
14 questions
Poshan Abhiyaan : ILA - Module 13
Quiz
•
Professional Development
10 questions
訓練員概念測驗
Quiz
•
Professional Development
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
