Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 121

A company is discarding a classified storage array and hires an outside vendor to complete the disposal. Which of the following should the company request from the vendor?

A.

Certification

B.

Inventory list

C.

Classification

D.

Proof of ownership

Full Access
Question # 122

A Chief Information Security Officer wants to monitor the company's servers for SQLi attacks and allow for comprehensive investigations if an attack occurs. The company uses SSL decryption to allow traffic monitoring. Which of the following strategies would best accomplish this goal?

A.

Logging all NetFlow traffic into a SIEM

B.

Deploying network traffic sensors on the same subnet as the servers

C.

Logging endpoint and OS-specific security logs

D.

Enabling full packet capture for traffic entering and exiting the servers

Full Access
Question # 123

A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?

A.

SOAR

B.

SIEM

C.

MDM

D.

DLP

Full Access
Question # 124

Which of the following is an example of a data protection strategy that uses tokenization?

A.

Encrypting databases containing sensitive data

B.

Replacing sensitive data with surrogate values

C.

Removing sensitive data from production systems

D.

Hashing sensitive data in critical systems

Full Access
Question # 125

The security team at a large global company needs to reduce the cost of storing data used for performing investigations. Which of the following types of data should have its retention length reduced?

A.

Packet capture

B.

Endpoint logs

C.

OS security logs

D.

Vulnerability scan

Full Access
Question # 126

A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?

A.

Hashing

B.

Tokenization

C.

Encryption

D.

Segmentation

Full Access
Question # 127

Which of the following is an algorithm performed to verify that data has not been modified?

A.

Hash

B.

Code check

C.

Encryption

D.

Checksum

Full Access
Question # 128

A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)

A.

If a security incident occurs on the device, the correct employee can be notified.

B.

The security team will be able to send user awareness training to the appropriate device.

C.

Users can be mapped to their devices when configuring software MFA tokens.

D.

User-based firewall policies can be correctly targeted to the appropriate laptops.

E.

When conducting penetration testing, the security team will be able to target the desired laptops.

F.

Company data can be accounted for when the employee leaves the organization.

Full Access
Go to page: