Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 113

A program manager wants to ensure contract employees can only use the company’s computers Monday through Friday from 9 a.m. to 5 p.m. Which of the following would best enforce this access control?

A.

Creating a GPO for all contract employees and setting time-of-day log-in restrictions

B.

Creating a discretionary access policy and setting rule-based access for contract employees

C.

Implementing an OAuth server and then setting least privilege for contract employees

D.

Implementing SAML with federation to the contract employees' authentication server

Full Access
Question # 114

A cybersecurity incident response team at a large company receives notification that malware is present on several corporate desktops No known Indicators of compromise have been found on the network. Which of the following should the team do first to secure the environment?

A.

Contain the Impacted hosts

B.

Add the malware to the application blocklist.

C.

Segment the core database server.

D.

Implement firewall rules to block outbound beaconing

Full Access
Question # 115

Which of the following hardening techniques must be applied on a container image before deploying it to a production environment? (Select two).

A.

Remove default applications.

B.

Install a NIPS.

C.

Disable Telnet.

D.

Reconfigure the DNS

E.

Add an SFTP server.

F.

Delete the public certificate.

Full Access
Question # 116

Which of the following can best contribute to prioritizing patch applications?

A.

CVSS

B.

SCAP

C.

OSINT

D.

CVE

Full Access
Question # 117

A business provides long-term cold storage services to banks that are required to follow regulator-imposed data retention guidelines. Banks that use these services require that data is disposed of in a specific manner at the conclusion of the regulatory threshold for data retention. Which of the following aspects of data management is the most important to the bank in the destruction of this data?

A.

Encryption

B.

Classification

C.

Certification

D.

Procurement

Full Access
Question # 118

An administrator needs to perform server hardening before deployment. Which of the following steps should the administrator take? (Select two).

A.

Disable default accounts.

B.

Add the server to the asset inventory.

C.

Remove unnecessary services.

D.

Document default passwords.

E.

Send server logs to the SIEM.

F.

Join the server to the corporate domain.

Full Access
Question # 119

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?

A.

Clustering servers

B.

Geographic dispersion

C.

Load balancers

D.

Off-site backups

Full Access
Question # 120

A company with a high-availability website is looking to harden its controls at any cost. The company wants to ensure that the site is secure by finding any possible issues. Which of the following would most likely achieve this goal?

A.

Permission restrictions

B.

Bug bounty program

C.

Vulnerability scan

D.

Reconnaissance

Full Access
Go to page: