Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

ACTUAL COMPTIA SECURITY+ (SY0-701) CERTIFICATION TEST

Puntuación
-
Vendido
-
Páginas
30
Grado
A+
Subido en
30-03-2026
Escrito en
2025/2026

CompTIA Security+ (SY0-701) Practice Exam 1. A security analyst is conducting a penetration test and has gained access to a system. They want to maintain access for further exploration. Which of the following actions BEST represents this phase? a) Scanning b) Gaining access c) Privilege escalation d) Persistence Answer: d) Persistence Persistence involves creating backdoors or other methods to ensure continued access to a compromised system, even after a reboot or password change. This is a key phase after initial exploitation. 2. A company wants to ensure that even if a user's password is compromised, an attacker cannot access the corporate VPN without a second form of verification. Which of the following is the BEST solution? a) Single sign-on (SSO) b) Mandatory Access Control (MAC) c) Multifactor authentication (MFA) d) Role-based access control (RBAC) Answer: c) Multifactor authentication (MFA) MFA requires two or more verification factors (e.g., password and a push notification to a phone), significantly reducing the risk of account takeover even if one factor is compromised. 3. An organization experiences a widespread ransomware attack that encrypts critical servers. The incident response team restores the servers from backups. Which of the following phases of the incident response process are they currently in?

Mostrar más Leer menos
Institución
Nursing
Grado
Nursing

Vista previa del contenido

ACTUAL COMPTIA SECURITY+ (SY0-701)
CERTIFICATION TEST


CompTIA Security+ (SY0-701) Practice Exam
1. A security analyst is conducting a penetration test and has gained access to a
system. They want to maintain access for further exploration. Which of the
following actions BEST represents this phase?
a) Scanning
b) Gaining access
c) Privilege escalation
d) Persistence
Answer: d) Persistence
Persistence involves creating backdoors or other methods to ensure continued access to a
compromised system, even after a reboot or password change. This is a key phase after
initial exploitation.

2. A company wants to ensure that even if a user's password is compromised, an
attacker cannot access the corporate VPN without a second form of verification.
Which of the following is the BEST solution?
a) Single sign-on (SSO)
b) Mandatory Access Control (MAC)
c) Multifactor authentication (MFA)
d) Role-based access control (RBAC)
Answer: c) Multifactor authentication (MFA)
MFA requires two or more verification factors (e.g., password and a push notification to a
phone), significantly reducing the risk of account takeover even if one factor is
compromised.

3. An organization experiences a widespread ransomware attack that encrypts
critical servers. The incident response team restores the servers from backups.
Which of the following phases of the incident response process are they currently
in?
a) Preparation
b) Identification
c) Containment, Eradication, and Recovery

,d) Lessons Learned
Answer: c) Containment, Eradication, and Recovery
Restoring systems from backups falls under the Recovery sub-phase, which is part of the
"Containment, Eradication, and Recovery" phase. The goal is to return affected systems to
normal operations.

4. Which of the following threat actors is MOST likely to be state-sponsored and
have the highest level of resources, patience, and operational security?
a) Script kiddie
b) Hacktivist
c) Advanced Persistent Threat (APT)
d) Insider threat
Answer: c) Advanced Persistent Threat (APT)
APTs are typically state-sponsored or state-affiliated groups with significant resources.
They conduct long-term, targeted operations to steal data or maintain persistent access,
often remaining undetected for extended periods.

5. A network administrator is configuring a firewall to block all traffic from a
specific IP address that was identified as a source of a DoS attack. What type of
control is this?
a) Preventive
b) Detective
c) Corrective
d) Compensating
Answer: a) Preventive
Blocking traffic is a preventive control, as it acts to stop a security incident from occurring
or impacting the network. It proactively enforces security rules.

6. Which of the following cryptographic algorithms is considered deprecated and
should generally be avoided due to known vulnerabilities like collision attacks?
a) AES-256
b) RSA-4096
c) SHA-1
d) ECDH
Answer: c) SHA-1
*The SHA-1 hash algorithm has been proven vulnerable to collision attacks, where two
different inputs produce the same hash output. It has been deprecated in favor of more
secure algorithms like SHA-256 and SHA-3.*

7. A security engineer is implementing a solution to ensure that sensitive data
stored in a cloud database is unreadable if the underlying storage media is stolen.

, Which of the following is the BEST control?
a) Hashing
b) Tokenization
c) Encryption at rest
d) Data loss prevention (DLP)
Answer: c) Encryption at rest
Encryption at rest protects data stored on media (like hard drives or databases). If the
media is physically stolen, the data remains unreadable without the decryption key,
ensuring confidentiality.

8. An organization wants to implement a wireless security solution that uses the
latest standards and requires the use of a RADIUS server for centralized
authentication. Which of the following is the BEST choice?
a) WPA2-Personal
b) WPA3-Enterprise
c) Open network with captive portal
d) WEP
Answer: b) WPA3-Enterprise
*WPA3-Enterprise is the latest standard for securing Wi-Fi networks, utilizing 192-bit
encryption in its highest mode and requiring a RADIUS/AAA server for centralized
authentication, which is ideal for organizations.*

9. A system administrator needs to ensure that a software application is free from
known vulnerabilities before it is deployed to production. Which of the following
practices would BEST accomplish this?
a) Static code analysis
b) Fuzzing
c) Vulnerability scanning
d) Penetration testing
Answer: a) Static code analysis
Static code analysis (SAST) examines the source code of the application to identify security
flaws, logic errors, and compliance issues before the application is compiled and deployed.

10. Which of the following types of access control defines permissions based on
the user's job function or position within the organization?
a) Mandatory Access Control (MAC)
b) Discretionary Access Control (DAC)
c) Role-Based Access Control (RBAC)
d) Attribute-Based Access Control (ABAC)
Answer: c) Role-Based Access Control (RBAC)
RBAC assigns permissions to roles (e.g., "Sales Manager," "Database Administrator") rather

Escuela, estudio y materia

Institución
Nursing
Grado
Nursing

Información del documento

Subido en
30 de marzo de 2026
Número de páginas
30
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$39.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
muriithi

Documento también disponible en un lote

Conoce al vendedor

Seller avatar
muriithi Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
9
Miembro desde
2 año
Número de seguidores
2
Documentos
975
Última venta
3 días hace
HERE YOU WILL FIND IT!!!

Think,Explore,Discover and meet a new difference....here I simply want to make what you want.... And Thank You Again For Chosing Me

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes