Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 33

A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non-encrypted websites?

A.

encryption=off\

B.

http://

C.

www.*.com

D.

:443

Full Access
Question # 34

During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?

A.

Analysis

B.

Lessons learned

C.

Detection

D.

Containment

Full Access
Question # 35

Which of the following is most likely associated with introducing vulnerabilities on a corporate network by the deployment of unapproved software?

A.

Hacktivists

B.

Script kiddies

C.

Competitors

D.

Shadow IT

Full Access
Question # 36

Which of the following data protection strategies can be used to confirm file integrity?

A.

Masking

B.

Encryption

C.

Hashing

D.

Obfuscation

Full Access
Question # 37

A systems administrator is concerned about vulnerabilities within cloud computing instances Which of the following is most important for the administrator to consider when architecting a cloud computing environment?

A.

SQL injection

B.

TOC/TOU

C.

VM escape

D.

Tokenization

E.

Password spraying

Full Access
Question # 38

A security analyst finds a rogue device during a monthly audit of current endpoint assets that are connected to the network. The corporate network utilizes 002.1X for access control. To be allowed on the network, a device must have a Known hardware address, and a valid user name and password must be entered in a captive portal. The following is the audit report:

Which of the following is the most likely way a rogue device was allowed to connect?

A.

A user performed a MAC cloning attack with a personal device.

B.

A DMCP failure caused an incorrect IP address to be distributed

C.

An administrator bypassed the security controls for testing.

D.

DNS hijacking let an attacker intercept the captive portal traffic.

Full Access
Question # 39

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Non-repudiation

Full Access
Question # 40

A systems administrator receives an alert that a company's internal file server is very slow and is only working intermittently. The systems administrator reviews the server management software and finds the following information about the server:

Which of the following indicators most likely triggered this alert?

A.

Concurrent session usage

B.

Network saturation

C.

Account lockout

D.

Resource consumption

Full Access
Go to page: