100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CompTIA Security+ (SY0-701) Complete Course & Exam – 2 with correct answers

Puntuación
-
Vendido
-
Páginas
64
Grado
A+
Subido en
09-11-2025
Escrito en
2025/2026

CompTIA Security+ (SY0-701) Complete Course & Exam – 2 with correct answers

Institución
CompTIA Security+ SY0-701
Grado
CompTIA Security+ SY0-701











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CompTIA Security+ SY0-701
Grado
CompTIA Security+ SY0-701

Información del documento

Subido en
9 de noviembre de 2025
Número de páginas
64
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CompTIA Security+ (SY0-701) Complete |\ |\ |\ |\




Course & Exam – 2 with correct answers |\ |\ |\ |\ |\ |\ |\




Jane, a database administrator at Dion Training, wants to ensure
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


that a file has not changed since the last time she uploaded it to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


her cloud storage. She has created an SHA-256 hash digest of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the file and will compare the stored file's hash digest against the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


one she calculated when she initially uploaded the file. Which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the following pillars of the CIANA pentagon is she focused on? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Integrity |\ |\




Vikas, a developer at Dion Training, just digitally signed the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


company's new app before releasing it in the App Store. Before
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the app is installed, the user's device will validate the digitally
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


signature to ensure that it was actually developed and uploaded
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


by Dion Training. Which of the following pillars of the CIANA
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


pentagon is she focused on? - CORRECT ANSWERS ✔✔Non-
|\ |\ |\ |\ |\ |\ |\ |\


repudiation


Jason, an instructor at Dion Training, is logging into the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


company's exam application to write some new questions for the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CompTIA Security+ exam. He enters his username/password at
|\ |\ |\ |\ |\ |\ |\ |\


the login prompt and then receives a one-time code on his
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


smartphone that he enters to validate his identity. Which of the |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


following pillars of security was he focused on when performing
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


this action? - CORRECT ANSWERS ✔✔Authentication
|\ |\ |\ |\ |\




David, the CTO of Dion Training, just sent out a new policy that
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


will require all of the company's users to reset their password
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\

,every 60 days using a long, strong, and complex password.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


Which of the following type of security controls best classifies this
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


policy? - CORRECT ANSWERS ✔✔Directive
|\ |\ |\ |\ |\




Christle, a student support manager at Dion Training, is logging
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


into the company's exam voucher application to help a student
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


schedule their CompTIA Security+ exam. Even though she is
|\ |\ |\ |\ |\ |\ |\ |\ |\


already connected to the corporate network, the application asks
|\ |\ |\ |\ |\ |\ |\ |\ |\


her to validate her identity by sending her a one-time code on
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


her smartphone that she enters to validate her identity. Which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the following security concepts is being utilized by the company's
|\ |\ |\ |\ |\ |\ |\ |\ |\


architecture? - CORRECT ANSWERS ✔✔Zero trust
|\ |\ |\ |\ |\ |\




Which of the following is a primary motivation for a hacktivist
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


threat actor? - CORRECT ANSWERS ✔✔Ideological beliefs
|\ |\ |\ |\ |\ |\




Which attribute of a threat actor indicates the amount of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


financial, technological, and human resources they can use for
|\ |\ |\ |\ |\ |\ |\ |\ |\


their operations? - CORRECT ANSWERS ✔✔Their resource level
|\ |\ |\ |\ |\ |\ |\




Which of the following threat actors primarily operates based
|\ |\ |\ |\ |\ |\ |\ |\ |\


primarily on financial motivations and is considered to be highly
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


structured and sophisticated in their attacks? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Organized crime |\ |\




Which type of threat actor would BEST describe a disgruntled
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


employee who may exploit their legitimate access for malicious
|\ |\ |\ |\ |\ |\ |\ |\ |\


purposes? - CORRECT ANSWERS ✔✔Insider threat |\ |\ |\ |\ |\

,Which deceptive technology is a piece of data or a system entity
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


that exists solely to alert the organization when someone
|\ |\ |\ |\ |\ |\ |\ |\ |\


accesses it? - CORRECT ANSWERS ✔✔Honeytoken
|\ |\ |\ |\ |\




Jennifer, a facilities manager at Dion Training, wants to prevent
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


unauthorized vehicles from getting too close to the building and |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


ramming into it. Which of the following physical security control
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


measures should they utilize to achieve this? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\


ANSWERS ✔✔Bollards |\




Jacob, a security manager at Dion Training, wants to protect a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


sensitive server room against unauthorized physical access
|\ |\ |\ |\ |\ |\ |\


without relying on electronic locking mechanisms. Which of the
|\ |\ |\ |\ |\ |\ |\ |\ |\


following door locks should they utilize to achieve this? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Cipher lock |\ |\ |\




Jonni, a security manager at Dion Training, wants to implement a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


physical security control measure at the main entrance of their
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


new corporate headquarters. Their primary objective is to
|\ |\ |\ |\ |\ |\ |\ |\


authenticate individuals in a space between two sets of doors to|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


help prevent tailgating by ensuring that unauthorized persons
|\ |\ |\ |\ |\ |\ |\ |\


don't follow authorized individuals inside. Which of the following
|\ |\ |\ |\ |\ |\ |\ |\ |\


security controls should he implement to best achieve this? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


CORRECT ANSWERS ✔✔Access control vestibule |\ |\ |\ |\




Sheryl, a penetration tester at Dion Training, wants to break into
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


the RFID-protected server room. She sees Mazen sitting in a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


coffee shop, so she briefly places her purse near Mazen's
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


backpack. Later, she uses a device from her purse to access the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


server room. She receives a message stating, "Welcome, Mazen"
|\ |\ |\ |\ |\ |\ |\ |\ |\


when she authenticates with the RFID-based lock using the
|\ |\ |\ |\ |\ |\ |\ |\ |\

, device. Which of the following types of attacks did she utilize to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


gain access to the server room? - CORRECT ANSWERS ✔✔Access
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


badge cloning |\




Which of the following sensors is used to detect changes in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


environmental heat that is typically emitted by warm bodies such |\ |\ |\ |\ |\ |\ |\ |\ |\


as humans or animals? - CORRECT ANSWERS ✔✔Infrared sensors
|\ |\ |\ |\ |\ |\ |\ |\ |\




Which of the following types of phishing attacks is used to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


specifically target high-level executives or important officials
|\ |\ |\ |\ |\ |\ |\


within an organization? - CORRECT ANSWERS ✔✔Whaling
|\ |\ |\ |\ |\ |\




During an anti-phishing campaign, what primary action should a
|\ |\ |\ |\ |\ |\ |\ |\ |\


company take after simulating a successful phishing attack on its
|\ |\ |\ |\ |\ |\ |\ |\ |\


employees? - CORRECT ANSWERS ✔✔Provide remedial training
|\ |\ |\ |\ |\ |\ |\ |\


to employees who fell for the attack
|\ |\ |\ |\ |\ |\




Which social engineering technique involves searching through a
|\ |\ |\ |\ |\ |\ |\ |\


target's trash or discarded items to obtain sensitive or valuable
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\


information? - CORRECT ANSWERS ✔✔Dumpster diving |\ |\ |\ |\ |\




Which social engineering attack involves an attacker creating a
|\ |\ |\ |\ |\ |\ |\ |\ |\


fabricated scenario to manipulate or deceive someone into
|\ |\ |\ |\ |\ |\ |\ |\


divulging confidential information? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\


✔✔Pretexting


Which of the following is a common motivational trigger used in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\


social engineering attacks to manipulate victims to act or
|\ |\ |\ |\ |\ |\ |\ |\ |\
$25.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EXAMSTUDYPLUG Stanford University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
309
Miembro desde
3 año
Número de seguidores
107
Documentos
18416
Última venta
2 horas hace
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lee mas Leer menos
4.5

230 reseñas

5
155
4
50
3
13
2
5
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes