Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA SY0-701 Practice Exam with Questions & Answers

Questions 1

A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the increase of ransomware-as-a-service in a report to the management team. Which of the following best describes the threat actor in the CISO's report?

Options:
A.

Insider threat

B.

Hacktivist

C.

Nation-state

D.

Organized crime

CompTIA SY0-701 Premium Access
Questions 2

A security analyst has determined that a security breach would have a financial impact of $15,000 and is expected to occur twice within a three-year period. Which of the following is the ALE for this risk?

Options:
A.

$7,500

B.

$10,000

C.

$15,000

D.

$30,000

Questions 3

Which of the following describes the procedures a penetration tester must follow while conducting a test?

Options:
A.

Rules of engagement

B.

Rules of acceptance

C.

Rules of understanding

D.

Rules of execution

Questions 4

A malicious update was distributed to a common software platform and disabled services at many organizations. Which of the following best describes this type of vulnerability?

Options:
A.

DDoS attack

B.

Rogue employee

C.

Insider threat

D.

Supply chain

Questions 5

A company with a high-availability website is looking to harden its controls at any cost. The company wants to ensure that the site is secure by finding any possible issues. Which of the following would most likely achieve this goal?

Options:
A.

Permission restrictions

B.

Bug bounty program

C.

Vulnerability scan

D.

Reconnaissance

Questions 6

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

Options:
A.

Risk tolerance

B.

Risk transfer

C.

Risk register

D.

Risk analysis

Questions 7

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

Options:
A.

Business continuity

B.

Physical security

C.

Change management

D.

Disaster recovery

Questions 8

Which of the following should a company use to provide proof of external network security testing?

Options:
A.

Business impact analysis

B.

Supply chain analysis

C.

Vulnerability assessment

D.

Third-party attestation

Questions 9

Which of the following activities uses OSINT?

Options:
A.

Social engineering testing

B.

Data analysis of logs

C.

Collecting evidence of malicious activity

D.

Producing IOC for malicious artifacts

Questions 10

An IT security team is concerned about the confidentiality of documents left unattended in MFPs. Which of the following should the security team do to mitigate the situation?

Options:
A.

Educate users about the importance of paper shredder devices.

B.

Deploy an authentication factor that requires ln-person action before printing.

C.

Install a software client m every computer authorized to use the MFPs.

D.

Update the management software to utilize encryption.

Questions 11

During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Oncethe password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Select two).

Options:
A.

Federation

B.

Identity proofing

C.

Password complexity

D.

Default password changes

E.

Password manager

F.

Open authentication

Questions 12

A company wants to reduce the time and expense associated with code deployment. Which of the following technologies should the company utilize?

Options:
A.

Serverless architecture

B.

Thin clients

C.

Private cloud

D.

Virtual machines

Questions 13

Which of the following is a compensating control for providing user access to a high-risk website?

Options:
A.

Enabling threat prevention features on the firewall

B.

Configuring a SIEM tool to capture all web traffic

C.

Setting firewall rules to allow traffic from any port to that destination

D.

Blocking that website on the endpoint protection software

Questions 14

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

Options:
A.

Packet captures

B.

Vulnerability scans

C.

Metadata

D.

Dashboard

Questions 15

A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

Options:
A.

Data retention

B.

Certification

C.

Tokenization

D.

Classification

E.

Sanitization

F.

Enumeration