SY0-701 Practice Test || With 100%
Accurate Answers
Conceptial Research 2025
, CompTIA Security+ Certification Exam
SY0-701 Practice Test || With 100%
Accurate Answers
A software or hardware that checks information coming from the Internet and depending
on the applied configuration settings either blocks it or allows it to pass through is
called:
A. Antivirus
B. Firewall
C. Antispyware
D. Malware - ANSWER - B. Firewall
A device designed to forward data packets between networks is called:
A. Layer 2 switch
B. Active hub
C. Content filter
D. Router - ANSWER - D. Router
Allowing a connection through a firewall is known as creating:
A. Tunnel
B. Exception
C. Access Point
D. Entry - ANSWER - B. Exception
A network device designed for managing the optimal distribution of workloads across
multiple computing resources is called:
A. Load balancer
B. HIDS
C. Firewall
D. Captive portal - ANSWER - A. Load balancer
The last default rule on a firewall is to deny all traffic
True
False - ANSWER - True
A computer network service that allows clients to make indirect network connections to
other network services is called:
, A. Load balancing
B. Proxy
C. Network Access Control (NAC)
D. Backdoor - ANSWER - B. Proxy
Which of the terms listed below refers to a security solution implemented on an
individual computer host monitoring that specific system for malicious activities or policy
violations?
A. NIPS
B. Content filter
C. Firewall
D. HIDS - ANSWER - D. HIDS
One of the measures for securing networking devices includes the practice of disabling
unused ports.
True
False - ANSWER - True
Which of the following ensures the privacy of a VPN connection?
A. Hashing
B. Tunneling
C. Authentication
D. Cleartext credentials - ANSWER - B. Tunneling
Which of the following answers refers to a dedicated device for managing secure
connections established over an untrusted network, such as the Internet?
A. Load balancer
B. VPN concentrator
C. Layer 3 switch
D. Hardware firewall - ANSWER - B. VPN concentrator
Which of the following acronyms refers to a network or host based monitoring system
designed to automatically alert administrators of known or suspected unauthorized
activity?
A. IDS
B. AES
C. TPM
D. EFS - ANSWER - A. IDS
A software tool used for monitoring and examining contents of the network traffic is
known as: (Select all that apply)