Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SY0-701 Exam Dumps - CompTIA Security+ Questions and Answers

Question # 49

Which of the following best represents how frequently an incident is expected to happen each year?

Options:

A.

RTO

B.

ALE

C.

SLE

D.

ARO

Buy Now
Question # 50

A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?

Options:

A.

Enumeration

B.

Sanitization

C.

Destruction

D.

Inventory

Buy Now
Question # 51

Which of the following is most likely in a responsibility matrix in a cloud computing environment?

Options:

A.

The customer is responsible for information and data regardless of the cloud model used.

B.

The cloud provider is responsible for account and identity management for connected devices.

C.

The customer and the cloud provider share responsibility for the physical network infrastructure.

D.

The cloud provider is responsible for the security of endpoints connected to the infrastructure.

Buy Now
Question # 52

Which of the following should an internal auditor check for first when conducting an audit of the organization’s risk management program?

Options:

A.

Policies and procedures

B.

Asset management

C.

Vulnerability assessment

D.

Business impact analysis

Buy Now
Question # 53

Which of the following control types describes an alert from a SIEM tool?

Options:

A.

Preventive

B.

Corrective

C.

Compensating

D.

Detective

Buy Now
Question # 54

A security technician determines that no additional patches can be applied to an application and the risks of operating as such must be accepted. Additionally, only a limited number of network services should utilize the application. Which of the following best describes this type of mitigation?

Options:

A.

Patching

B.

Segmentation

C.

Isolation

D.

Monitoring

Buy Now
Question # 55

A company discovers suspicious transactions that were entered into the company ' s database and attached to a user account that was created as a trap for malicious activity. Which of the following is the user account an example of?

Options:

A.

Honeytoken

B.

Honeynet

C.

Honeypot

D.

Honeyfile

Buy Now
Question # 56

An enterprise security team is researching a new security architecture to better protect the company ' s networks and applications against the latest cyberthreats. The company has a fully remote workforce. The solution should be highly redundant and enable users to connect to a VPN with an integrated, software-based firewall. Which of the following solutions meets these requirements?

Options:

A.

IPS

B.

SIEM

C.

SASE

D.

CASB

Buy Now
Question # 57

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?

Options:

A.

Group Policy

B.

Content filtering

C.

Data loss prevention

D.

Access control lists

Buy Now
Question # 58

Which of the following best describes a method for ongoing vendor monitoring in third-party risk management?

Options:

A.

Requiring a new MSA for each project

B.

Accepting vendor self-attestation without further verification

C.

Conducting assessments to verify compliance with security requirements

D.

Reviewing SLAs at the start of the contract

Buy Now
Question # 59

Which of the following can be best used to discover a company ' s publicly available breach information?

Options:

A.

OSINT

B.

SIEM

C.

CVE

D.

CVSS

Buy Now
Question # 60

A penetration test has demonstrated that domain administrator accounts were vulnerable to pass-the-hash attacks. Which of the following would have been the best strategy to prevent the threat actor from using domain administrator accounts?

Options:

A.

Audit each domain administrator account weekly for password compliance.

B.

Implement a privileged access management solution.

C.

Create IDS policies to monitor domain controller access.

D.

Use Group Policy to enforce password expiration.

Buy Now
Question # 61

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

Options:

A.

Bollards

B.

Access badge

C.

Motion sensor

D.

Video surveillance

Buy Now
Question # 62

An organization failed to account for the right-to-be-forgotten regulations. Which of the following impacts might this action have on the company?

Options:

A.

Fines

B.

Data breaches

C.

Revenue loss

D.

Blackmail

Buy Now
Question # 63

A company wants to track modifications to the code that is used to build new virtual servers. Which of the following will the company most likely deploy?

Options:

A.

Change management ticketing system

B.

Behavioral analyzer

C.

Collaboration platform

D.

Version control tool

Buy Now
Exam Code: SY0-701
Exam Name: CompTIA Security+ Exam 2026
Last Update: May 2, 2026
Questions: 821
SY0-701 pdf

SY0-701 PDF

$25.5  $84.99
SY0-701 Engine

SY0-701 Testing Engine

$28.5  $94.99
SY0-701 PDF + Engine

SY0-701 PDF + Testing Engine

$40.5  $134.99