100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ (SY0-701) Complete Course & Exam – 2 with correct answers

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
09-11-2025
Written in
2025/2026

CompTIA Security+ (SY0-701) Complete Course & Exam – 2 with correct answers

Institution
CompTIA Security+ SY0-701
Course
CompTIA Security+ SY0-701











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Security+ SY0-701
Course
CompTIA Security+ SY0-701

Document information

Uploaded on
November 9, 2025
Number of pages
64
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA Security+ (SY0-701) Complete |\ |\ |\ |\




Course & Exam – 2 with correct answers |\ |\ |\ |\ |\ |\ |\




Jane, a database administrator at Dion Training, wants to ensure
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


that a file has not changed since the last time she uploaded it to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


her cloud storage. She has created an SHA-256 hash digest of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the file and will compare the stored file's hash digest against the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


one she calculated when she initially uploaded the file. Which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the following pillars of the CIANA pentagon is she focused on? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Integrity |\ |\




Vikas, a developer at Dion Training, just digitally signed the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


company's new app before releasing it in the App Store. Before
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the app is installed, the user's device will validate the digitally
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


signature to ensure that it was actually developed and uploaded
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


by Dion Training. Which of the following pillars of the CIANA
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


pentagon is she focused on? - CORRECT ANSWERS ✔✔Non-
|\ |\ |\ |\ |\ |\ |\ |\


repudiation


Jason, an instructor at Dion Training, is logging into the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


company's exam application to write some new questions for the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CompTIA Security+ exam. He enters his username/password at
|\ |\ |\ |\ |\ |\ |\ |\


the login prompt and then receives a one-time code on his
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


smartphone that he enters to validate his identity. Which of the |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


following pillars of security was he focused on when performing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


this action? - CORRECT ANSWERS ✔✔Authentication
|\ |\ |\ |\ |\




David, the CTO of Dion Training, just sent out a new policy that
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


will require all of the company's users to reset their password
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\

,every 60 days using a long, strong, and complex password.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


Which of the following type of security controls best classifies this
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


policy? - CORRECT ANSWERS ✔✔Directive
|\ |\ |\ |\ |\




Christle, a student support manager at Dion Training, is logging
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


into the company's exam voucher application to help a student
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


schedule their CompTIA Security+ exam. Even though she is
|\ |\ |\ |\ |\ |\ |\ |\ |\


already connected to the corporate network, the application asks
|\ |\ |\ |\ |\ |\ |\ |\ |\


her to validate her identity by sending her a one-time code on
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


her smartphone that she enters to validate her identity. Which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the following security concepts is being utilized by the company's
|\ |\ |\ |\ |\ |\ |\ |\ |\


architecture? - CORRECT ANSWERS ✔✔Zero trust
|\ |\ |\ |\ |\ |\




Which of the following is a primary motivation for a hacktivist
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


threat actor? - CORRECT ANSWERS ✔✔Ideological beliefs
|\ |\ |\ |\ |\ |\




Which attribute of a threat actor indicates the amount of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


financial, technological, and human resources they can use for
|\ |\ |\ |\ |\ |\ |\ |\ |\


their operations? - CORRECT ANSWERS ✔✔Their resource level
|\ |\ |\ |\ |\ |\ |\




Which of the following threat actors primarily operates based
|\ |\ |\ |\ |\ |\ |\ |\ |\


primarily on financial motivations and is considered to be highly
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


structured and sophisticated in their attacks? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Organized crime |\ |\




Which type of threat actor would BEST describe a disgruntled
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


employee who may exploit their legitimate access for malicious
|\ |\ |\ |\ |\ |\ |\ |\ |\


purposes? - CORRECT ANSWERS ✔✔Insider threat |\ |\ |\ |\ |\

,Which deceptive technology is a piece of data or a system entity
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


that exists solely to alert the organization when someone
|\ |\ |\ |\ |\ |\ |\ |\ |\


accesses it? - CORRECT ANSWERS ✔✔Honeytoken
|\ |\ |\ |\ |\




Jennifer, a facilities manager at Dion Training, wants to prevent
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


unauthorized vehicles from getting too close to the building and |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ramming into it. Which of the following physical security control
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


measures should they utilize to achieve this? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Bollards |\




Jacob, a security manager at Dion Training, wants to protect a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


sensitive server room against unauthorized physical access
|\ |\ |\ |\ |\ |\ |\


without relying on electronic locking mechanisms. Which of the
|\ |\ |\ |\ |\ |\ |\ |\ |\


following door locks should they utilize to achieve this? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Cipher lock |\ |\ |\




Jonni, a security manager at Dion Training, wants to implement a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


physical security control measure at the main entrance of their
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


new corporate headquarters. Their primary objective is to
|\ |\ |\ |\ |\ |\ |\ |\


authenticate individuals in a space between two sets of doors to|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


help prevent tailgating by ensuring that unauthorized persons
|\ |\ |\ |\ |\ |\ |\ |\


don't follow authorized individuals inside. Which of the following
|\ |\ |\ |\ |\ |\ |\ |\ |\


security controls should he implement to best achieve this? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Access control vestibule |\ |\ |\ |\




Sheryl, a penetration tester at Dion Training, wants to break into
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the RFID-protected server room. She sees Mazen sitting in a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


coffee shop, so she briefly places her purse near Mazen's
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


backpack. Later, she uses a device from her purse to access the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


server room. She receives a message stating, "Welcome, Mazen"
|\ |\ |\ |\ |\ |\ |\ |\ |\


when she authenticates with the RFID-based lock using the
|\ |\ |\ |\ |\ |\ |\ |\ |\

, device. Which of the following types of attacks did she utilize to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


gain access to the server room? - CORRECT ANSWERS ✔✔Access
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


badge cloning |\




Which of the following sensors is used to detect changes in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


environmental heat that is typically emitted by warm bodies such |\ |\ |\ |\ |\ |\ |\ |\ |\


as humans or animals? - CORRECT ANSWERS ✔✔Infrared sensors
|\ |\ |\ |\ |\ |\ |\ |\ |\




Which of the following types of phishing attacks is used to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


specifically target high-level executives or important officials
|\ |\ |\ |\ |\ |\ |\


within an organization? - CORRECT ANSWERS ✔✔Whaling
|\ |\ |\ |\ |\ |\




During an anti-phishing campaign, what primary action should a
|\ |\ |\ |\ |\ |\ |\ |\ |\


company take after simulating a successful phishing attack on its
|\ |\ |\ |\ |\ |\ |\ |\ |\


employees? - CORRECT ANSWERS ✔✔Provide remedial training
|\ |\ |\ |\ |\ |\ |\ |\


to employees who fell for the attack
|\ |\ |\ |\ |\ |\




Which social engineering technique involves searching through a
|\ |\ |\ |\ |\ |\ |\ |\


target's trash or discarded items to obtain sensitive or valuable
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


information? - CORRECT ANSWERS ✔✔Dumpster diving |\ |\ |\ |\ |\




Which social engineering attack involves an attacker creating a
|\ |\ |\ |\ |\ |\ |\ |\ |\


fabricated scenario to manipulate or deceive someone into
|\ |\ |\ |\ |\ |\ |\ |\


divulging confidential information? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\


✔✔Pretexting


Which of the following is a common motivational trigger used in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


social engineering attacks to manipulate victims to act or
|\ |\ |\ |\ |\ |\ |\ |\ |\

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
300
Member since
3 year
Number of followers
107
Documents
17722
Last sold
21 hours ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

230 reviews

5
155
4
50
3
13
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions