Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 169

Which of the following is a type of vulnerability that refers to the unauthorized installation of applications on a device through means other than the official application store?

A.

Cross-site scripting

B.

Buffer overflow

C.

Jailbreaking

D.

Side loading

Full Access
Question # 170

An administrator assists the legal and compliance team with ensuring information about customer transactions is archived for the proper time period. Which of the following data policies is the administrator carrying out?

A.

Compromise

B.

Retention

C.

Analysis

D.

Transfer

E.

Inventory

Full Access
Question # 171

Which of the following is the best way to securely store an encryption key for a data set in a manner that allows multiple entities to access the key when needed?

A.

Public key infrastructure

B.

Open public ledger

C.

Public key encryption

D.

Key escrow

Full Access
Question # 172

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

A.

Risk tolerance

B.

Risk transfer

C.

Risk register

D.

Risk analysis

Full Access
Question # 173

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

A.

Bollards

B.

Access badge

C.

Motion sensor

D.

Video surveillance

Full Access
Question # 174

Which of the following tools is best for logging and monitoring in a cloud environment?

A.

IPS

B.

FIM

C.

NAC

D.

SIEM

Full Access
Question # 175

Which of the following security concepts is accomplished with the installation of a RADIUS server?

A.

CIA

B.

AA

C.

ACL

D.

PEM

Full Access
Question # 176

Various company stakeholders meet to discuss roles and responsibilities in the event of a security breach that would affect offshore offices. Which of the following is this an example of?

A.

Tabletop exercise

B.

Penetration test

C.

Geographic dispersion

D.

Incident response

Full Access
Go to page: