Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 73

Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?

A.

Automation

B.

Compliance checklist

C.

Attestation

D.

Manual audit

Full Access
Question # 74

A company wants to improve the availability of its application with a solution that requires minimal effort in the event a server needs to be replaced or added. Which of the following would be the best solution to meet these objectives?

A.

Load balancing

B.

Fault tolerance

C.

Proxy servers

D.

Replication

Full Access
Question # 75

An administrator at a small business notices an increase in support calls from employees who receive a blocked page message after trying to navigate to a spoofed website. Which of the following should the administrator do?

A.

Deploy multifactor authentication.

B.

Decrease the level of the web filter settings

C.

Implement security awareness training.

D.

Update the acceptable use policy

Full Access
Question # 76

An organization experiences a cybersecurity incident involving a command-and-control server. Which of the following logs should be analyzed to identify the impacted host? (Select two).

A.

Application

B.

Authentication

C.

DHCP

D.

Network

E.

Firewall

F.

Database

Full Access
Question # 77

The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?

A.

Shadow IT

B.

Insider threat

C.

Data exfiltration

D.

Service disruption

Full Access
Question # 78

An analyst identifies that multiple users have the same passwords, but the hashes appear to be completely different. Which of the following most likely explains this issue?

A.

Data masking

B.

Salting

C.

Key escrow

D.

Tokenization

Full Access
Question # 79

The internal audit team determines a software application is no longer in scope for external reporting requirements. Which of the following will confirm management’s perspective that the application is no longer applicable?

A.

Data inventory and retention

B.

Right to be forgotten

C.

Due care and due diligence

D.

Acknowledgement and attestation

Full Access
Question # 80

A company wants to track modifications to the code used to build new virtual servers. Which of the following will the company most likely deploy?

A.

Change management ticketing system

B.

Behavioral analyzer

C.

Collaboration platform

D.

Version control tool

Full Access
Go to page: