DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Ace CompTIA SY0-701 Certification Exam Questions & Study Resources, CompTIA Security+ Exam| SPOTO

Conquer the CompTIA Security+ SY0-701 exam with our comprehensive study resources and practice tests. Evaluate your readiness with online exam questions covering the latest cybersecurity skills in risk management, incident response, forensics, and hybrid/cloud operations. Identify gaps in your knowledge through our realistic exam practice, sample questions, and mock exams that simulate the actual SY0-701 experience. Stay ahead of outdated exam dumps with our regularly updated exam questions and answers validated by industry experts. Access free tests, along with in-depth exam materials exploring core security controls and enterprise networking concepts. Master the essential baselines for security roles through our proven CompTIA Security+ certification prep toolkit.
Take other online exams

Question #1
A company has numerous employees who store PHI data locally on devices. The Chief Information Officer wants to implement a solution to reduce external exposure of PHI but not affect the business. The first step the IT team should perform is to deploy a DLP solution:
A. for only data in transit
B. for only data at reset
C. in blocking mode
D. in monitoring mode
View answer
Correct Answer: C
Question #2
Which of the following is a solution that can be used to stop a disgruntled employee from copying confidential data to a USB drive?
A. DLP
B. TLS
C. AV
D. IDS
View answer
Correct Answer: C
Question #3
An audit report indicates multiple suspicious attempts to access company resources were made. These attempts were not detected by the company. Which of the following would be the best solution to implement on the company's network?
A. Intrusion prevention system
B. Proxy server
C. Jump server
D. Security zones
View answer
Correct Answer: D
Question #4
Which of the following Is the BEST reason to maintain a functional and effective asset management policy that aids in ensuring the security of an organization?
A. To provide data to quantify risk based on the organization's systems
B. To keep all software and hardware fully patched for known vulnerabilities
C. To only allow approved, organization-owned devices onto the business network
D. To standardize by selecting one laptop model for all users in the organization
View answer
Correct Answer: D
Question #5
A manufacturing company has several one-off legacy information systems that cannot be migrated to a newer OS due to software compatibility issues. The OSs are still supported by the vendor but the industrial software is no longer supported The Chief Information Security Officer has created a resiliency plan for these systems that will allow OS patches to be installed in a non-production environment, white also creating backups of the systems for recovery. Which of the following resiliency techniques will pr
A. Redundancy
B. RAID 1+5
C. Virtual machines
D. Full backups
View answer
Correct Answer: A
Question #6
A help desk technician receives a phone call from someone claiming to be a part of the organization's cybersecurity incident response team. The caller asks the technician to verify the network's internal firewall IP address. Which of the following is the technician's best course of action?
A. Direct the caller to stop by the help desk in person and hang up declining any further requests from the caller
B. Ask for the caller's name, verify the person's identity in the email directory, and provide the requested information over the phone
C. Write down the phone number of the caller if possible, the name of the person requesting the information, hang up, and notify the organization's cybersecurity officer
D. Request the caller send an email for identity verification and provide the requested information via email to the caller
View answer
Correct Answer: B
Question #7
Which of the following security controls s sed to isolate a section of the network and its externally available resources from the internal corporate network in order to reduce the number of possible attacks?
A. Faraday cages
B. Air gap
C. Vaulting
D. Proximity readers
View answer
Correct Answer: C
Question #8
An administrator is configuring a firewall rule set for a subnet to only access DHCP, web pages, and SFTP, and to specifically block FTP. Which of the following would BEST accomplish this goal?
A. [Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Allow: Any Any 67-Allow: Any Any 68 -Allow: Any Any 22 -Deny: Any Any 21 -Deny: Any Any
B. [Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Allow: Any Any 67-Allow: Any Any 68 -Deny: Any Any 22 -Allow: Any Any 21 -Deny: Any Any
C. [Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Allow: Any Any 22-Deny: Any Any 67 -Deny: Any Any 68 -Deny: Any Any 21 -Allow: Any Any
D. [Permission Source Destination Port]Allow: Any Any 80 -Allow: Any Any 443 -Deny: Any Any 67-Allow: Any Any 68 -Allow: Any Any 22 -Allow: Any Any 21 -Allow: Any Any
View answer
Correct Answer: C
Question #9
Which of the following would help ensure a security analyst is able to accurately measure the overall risk to an organization when a new vulnerability is disclosed?
A. A full inventory of all hardware and software
B. Documentation of system classifications
C. A list of system owners and their departments
D. Third-party risk assessment documentation
View answer
Correct Answer: B
Question #10
A company would like to protect credit card information that is stored in a database from being exposed and reused. However, the current POS system does not support encryption. Which of the following would be BEST suited to secure this information? (Give me related explanation and references from CompTIA Security+ SY0-601 documents for Correct answer option)
A. Masking
B. Tokenization
C. DLP
D. SSL/TLS
View answer
Correct Answer: BF
Question #11
The Chief Technology Officer of a local college would like visitors to utilize the school's WiFi but must be able to associate potential malicious activity to a specific person. Which of the following would BEST allow this objective to be met?
A. Requiring all new, on-site visitors to configure their devices to use WPS
B. Implementing a new SSID for every event hosted by the college that has visitors
C. Creating a unique PSK for every visitor when they arrive at the reception area
D. Deploying a captive portal to capture visitors' MAC addresses and names
View answer
Correct Answer: D
Question #12
Which of the following is most likely to contain ranked and ordered information on the likelihood and potential impact of catastrophic events that may affect business processes and systems, while also highlighting the residual risks that need to be managed after mitigating controls have been implemented?
A. An RTO report
B. A risk register
C. A business impact analysis
D. An asset value register
E. A disaster recovery plan
View answer
Correct Answer: B
Question #13
An organization wants to ensure that proprietary information is not inadvertently exposed during facility tours. Which of the following would the organization implement to mitigate this risk?
A. Clean desk policy
B. Background checks
C. Non-disclosure agreements
D. Social media analysis
View answer
Correct Answer: A
Question #14
Which of the following can be used to calculate the total loss expected per year due to a threat targeting an asset?
A. EF x asset value
B. ALE / SLE
C. MTBF x impact
D. SLE x ARO
View answer
Correct Answer: D
Question #15
A company recently enhanced mobile device configuration by implementing a set of security controls: biometrics, context-aware authentication, and full device encryption. Even with these settings in place, an unattended phone was used by a malicious actor to access corporate data. Which of the following additional controls should be put in place first?
A. GPS tagging
B. Remote wipe
C. Screen lock timer
D. SEAndroid
View answer
Correct Answer: AC
Question #16
Security analysts have noticed the network becomes flooded with malicious packets at specific times of the day. Which of the following should the analysts use to investigate this issue?
A. Web metadata
B. Bandwidth monitors
C. System files
D. Correlation dashboards
View answer
Correct Answer: C
Question #17
During a recent security assessment, a vulnerability was found in a common OS. The OS vendor was unaware of the issue and promised to release a patch within the next quarter. Which of the following best describes this type of vulnerability?
A. Legacy operating system
B. Weak configuration
C. Zero day
D. Supply chain
View answer
Correct Answer: B
Question #18
The application development team is in the final stages of developing a new healthcare application. The team has requested copies of current PHI records to perform the final testing. Which of the following would be the best way to safeguard this information without impeding the testing process?
A. Implementing a content filter
B. Anonymizing the data
C. Deploying DLP tools
D. Installing a FIM on the application server
View answer
Correct Answer: C
Question #19
An organization has expanded its operations by opening a remote office. The new office is fully furnished with office resources to support up to 50 employees working on any given day. Which of the following VPN solutions would best support the new office?
A. Always-on
B. Remote access
C. Site-to-site
D. Full tunnel
View answer
Correct Answer: A
Question #20
A network architect wants a server to have the ability to retain network availability even if one of the network switches it is connected to goes down. Which of the following should the architect implement on the server to achieve this goal?
A. RAID
B. UPS
C. NIC teaming
D. Load balancing
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: