Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

SY0-701 CompTIA Security+ Exam 2026 Free Practice Exam Questions (2026 Updated)

Prepare effectively for your CompTIA SY0-701 CompTIA Security+ Exam 2026 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 9
Total 821 questions

A security analyst discovers that a large number of employee credentials had been stolen and were being sold on the dark web. The analyst investigates and discovers that some hourly employee credentials were compromised, but salaried employee credentials were not affected.

Most employees clocked in and out while they were Inside the building using one of the kiosks connected to the network. However, some clocked out and recorded their time after leaving to go home. Only those who clocked in and out while Inside the building had credentials stolen. Each of the kiosks are on different floors, and there are multiple routers, since the business segments environments for certain business functions.

Hourly employees are required to use a website called acmetimekeeping.com to clock in and out. This website is accessible from the internet. Which of the following Is the most likely reason for this compromise?

A.

A brute-force attack was used against the time-keeping website to scan for common passwords.

B.

A malicious actor compromised the time-keeping website with malicious code using an unpatched vulnerability on the site, stealing the credentials.

C.

The internal DNS servers were poisoned and were redirecting acmetimkeeping.com to malicious domain that intercepted the credentials and then passed them through to the real site

D.

ARP poisoning affected the machines in the building and caused the kiosks lo send a copy of all the submitted credentials to a machine.machine.

Which of the following mitigation techniques would a security analyst most likely use to avoid bloatware on devices?

A.

Disabled ports/protocols

B.

Application allow list

C.

Default password changes

D.

Access control permissions

After completing an annual external penetration test, a company receives the following guidance:

Decommission two unused web servers currently exposed to the internet.

Close 18 open and unused ports found on their existing production web servers.

Remove company email addresses and contact info from public domain registration records.

Which of the following does this represent?

A.

Attack surface reduction

B.

Vulnerability assessment

C.

Tabletop exercise

D.

Business impact analysis

A company wants to ensure that only authorized devices can enter an environment. Which of the following will the company most likely use to implement the control?

A.

Access lists

B.

Remote connection

C.

Screened subnets

D.

Centralized proxy

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

A.

Risk tolerance

B.

Risk transfer

C.

Risk register

D.

Risk analysis

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

A.

Default credentials

B.

Non-segmented network

C.

Supply chain vendor

D.

Vulnerable software

Which of the following examples would be best mitigated by input sanitization?

A.

< script > alert ( " Warning! " ) ,- < /script >

B.

nmap - 10.11.1.130

C.

Email message: " Click this link to get your free gift card. "

D.

Browser message: " Your connection is not private. "

The marketing department set up its own project management software without telling the appropriate departments. Which of the following describes this scenario?

A.

Shadow IT

B.

Insider threat

C.

Data exfiltration

D.

Service disruption

A company is concerned with supply chain compromise of new servers and wants to limit this risk. Which of the following should the company review first?

A.

Sanitization procedure

B.

Acquisition process

C.

Change management

D.

Asset tracking

Which of the following should be deployed on an externally facing web server in order to establish an encrypted connection?

A.

Public key

B.

Private Key

C.

Asymmetric key

D.

Symmetric key

A hacker gained access to a system via a phishing attempt that was a direct result of a user clicking a suspicious link. The link laterally deployed ransomware, which laid dormant for multiple weeks, across the network. Which of the following would have mitigated the spread?

A.

IPS

B.

IDS

C.

WAF

D.

UAT

Which of the following is required for an organization to properly manage its restore process in the event of system failure?

A.

IRP

B.

DRP

C.

RPO

D.

SDLC

A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?

A.

SOAR

B.

SIEM

C.

MDM

D.

DLP

Which of the following should be used to select a label for a file based on the file ' s value, sensitivity, or applicable regulations?

A.

Verification

B.

Certification

C.

Classification

D.

Inventory

A government official receives a blank envelope containing photos and a note instructing the official to wire a large sum of money by midnight to prevent the photos from being leaked on the Internet. Which of the following best describes the threat actor ' s intent?

A.

Organized crime

B.

Philosophical beliefs

C.

Espionage

D.

Blackmail

A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.

Which of the following is the most important consideration during development?

A.

Scalability

B.

Availability

C.

Cost

D.

Ease of deployment

A systems administrator needs to encrypt all data on employee laptops. Which of the following encryption levels should be implemented?

A.

Volume

B.

Partition

C.

Full disk

D.

File

While a school district is performing state testing, a security analyst notices all internet services are unavailable. The analyst discovers that ARP poisoning is occurring on the network and then terminates access for the host. Which of the following is most likely responsible for this malicious activity?

A.

Unskilled attacker

B.

Shadow IT

C.

Credential stuffing

D.

DMARC failure

A systems administrator needs to ensure the secure communication of sensitive data within the organization ' s private cloud. Which of the following is the best choice for the administrator to implement?

A.

IPSec

B.

SHA-1

C.

RSA

D.

TGT

A cybersecurity incident response team at a large company receives notification that malware is present on several corporate desktops No known Indicators of compromise have been found on the network. Which of the following should the team do first to secure the environment?

A.

Contain the Impacted hosts

B.

Add the malware to the application blocklist.

C.

Segment the core database server.

D.

Implement firewall rules to block outbound beaconing

Which of the following data states applies to data that is being actively processed by a database server?

A.

In use

B.

At rest

C.

In transit

D.

Being hashed

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

A security manager wants to reduce the number of steps required to identify and contain basic threats. Which of the following will help achieve this goal?

A.

SOAR

B.

SIEM

C.

DMARC

D.

NIDS

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?

A.

Serverless framework

B.

Type 1 hvpervisor

C.

SD-WAN

D.

SDN

Which of the following attacks primarily targets insecure networks?

A.

Evil twin

B.

Impersonation

C.

Watering hole

D.

Pretexting

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?

A.

Group Policy

B.

Content filtering

C.

Data loss prevention

D.

Access control lists

An office wants to install a Wi-Fi network. The security team must ensure a secure design. The access points will be more powerful and use WPA3 with a 16-character randomized key. Which of the following should the security team do next?

A.

Create a heat map of the building perimeter.

B.

Deploy IPSec tunnels from each access point to the controller.

C.

Enable WPA2-PSK with a 24-character randomized key.

D.

Disable SSH administration on all access points.

One of a company ' s vendors sent an analyst a security bulletin that recommends a BIOS update. Which of the following vulnerability types is being addressed by the patch?

A.

Virtualization

B.

Firmware

C.

Application

D.

Operating system

Which of the following is a key reason to follow data retention policies during asset decommissioning?

A.

To ensure data is securely destroyed when no longer needed

B.

To make backup copies of all company data before disposing of hardware

C.

To allow employees to access old files even after the hardware is recycled

D.

To keep all customer data available in case it is required in the future

A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Select two.)

A.

Tokenization

B.

Cryptographic downgrade

C.

SSH tunneling

D.

Segmentation

E.

Patch installation

F.

Data masking

Page: 2 / 9
Total 821 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved