
CompTIA Security+ SY0-701
Authored by Jomesh Joseph Veliyath
Professional Development
Professional Development
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?
EDR
NIDS
FDE
DLP
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A user is attempting to navigate to a website from inside the company network using a desktop. When the user types in the URL, https://www.site.com, the user is presented with a certificate mismatch warning from the browser. The user does not receive a warning when visiting http://www.anothersite.com. Which of the following describes this attack?
DNS poisoning
Domain hijacking
On-path
Evil twin
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following tools is effective in preventing a user from accessing unauthorized removable media?
USB data blocker
Faraday cage
Proximity reader
Cable lock
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements?
Reverse proxy
Automated patch management
Snapshots
NIC teaming
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?
A phishing email stating a cash settlement has been awarded but will expire soon
A smishing message stating a package is scheduled for pickup
A vishing call that requests a donation be made to a local charity
A SPIM notification claiming to be undercover law enforcement investigating a cybercrime
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
A security analyst is reviewing application logs to determine the source of a breach and locates the following log: https://www.comptia.com/login.php?id='%20or%20'1'1='1 Which of the following has been observed?
SQLi
API attack
DLL Injection
XSS
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
Data anonymization
Data encryption
Data tokenization
DDL
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?