Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 49

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an modem and prioritize the sequence for performing forensic analysis?

A.

Order of volatility

B.

Preservation of event logs

C.

Chain of custody

D.

Compliance with legal hold

Full Access
Question # 50

Which of the following can be used to identify potential attacker activities without affecting production servers?

A.

Honey pot

B.

Video surveillance

C.

Zero Trust

D.

Geofencing

Full Access
Question # 51

A security analyst is reviewing the following logs about a suspicious activity alert for a user's VPN log-ins. Which of the following malicious activity indicators triggered the alert?

✅Log Summary:

User logs in fromChicago, ILmultiple times, then suddenly a successful login appears fromRome, Italy, followed again by Chicago logins — all within ashort time span.

A.

Impossible travel

B.

Account lockout

C.

Blocked content

D.

Concurrent session usage

Full Access
Question # 52

A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?

A.

MSA

B.

SLA

C.

BPA

D.

SOW

Full Access
Question # 53

A company with a high-availability website is looking to harden its controls at any cost. The company wants to ensure that the site is secure by finding any possible issues. Which of the following would most likely achieve this goal?

A.

Permission restrictions

B.

Bug bounty program

C.

Vulnerability scan

D.

Reconnaissance

Full Access
Question # 54

An employee recently resigned from a company. The employee was responsible for managing and supporting weekly batch jobs over the past five years. A few weeks after the employee resigned. one of the batch jobs talked and caused a major disruption. Which of the following would work best to prevent this type of incident from reoccurring?

A.

Job rotation

B.

Retention

C.

Outsourcing

D.

Separation of duties

Full Access
Question # 55

After reviewing the following vulnerability scanning report:

Server:192.168.14.6

Service: Telnet

Port: 23 Protocol: TCP

Status: Open Severity: High

Vulnerability: Use of an insecure network protocol

A security analyst performs the following test:

nmap -p 23 192.168.14.6 —script telnet-encryption

PORT STATE SERVICE REASON

23/tcp open telnet syn-ack

I telnet encryption:

| _ Telnet server supports encryption

Which of the following would the security analyst conclude for this reported vulnerability?

A.

It is a false positive.

B.

A rescan is required.

C.

It is considered noise.

D.

Compensating controls exist.

Full Access
Question # 56

Which of the following digital forensics activities would a security team perform when responding to legal requests in a pending investigation?

A.

E-discovery

B.

User provisioning

C.

Firewall log export

D.

Root cause analysis

Full Access
Go to page: