Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

SY0-701 CompTIA Security+ Exam 2025 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA SY0-701 CompTIA Security+ Exam 2025 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 5 / 6
Total 571 questions

Which of the following would most likely be used by attackers to perform credential harvesting?

A.

Social engineering

B.

Supply chain compromise

C.

Third-party software

D.

Rainbow table

Which of the following is die most important security concern when using legacy systems to provide production service?

A.

Instability

B.

Lack of vendor support

C.

Loss of availability

D.

Use of insecure protocols

Which of the following should a security administrator adhere to when setting up a new set of firewall rules?

A.

Disaster recovery plan

B.

Incident response procedure

C.

Business continuity plan

D.

Change management procedure

Which of the following is a benefit of vendor diversity?

A.

Patch availability

B.

Zero-day resiliency

C.

Secure configuration guide applicability

D.

Load balancing

While investigating a possible incident, a security analyst discovers the following log entries:

67.118.34.157 ----- [28/Jul/2022:10:26:59 -0300] "GET /query.php?q-wireless%20headphones / HTTP/1.0" 200 12737

132.18.222.103 ----[28/Jul/2022:10:27:10 -0300] "GET /query.php?q=123 INSERT INTO users VALUES('temp', 'pass123')# / HTTP/1.0" 200 935

12.45.101.121 ----- [28/Jul/2022:10:27:22 -0300] "GET /query.php?q=mp3%20players I HTTP/1.0" 200 14650

Which of the following should the analyst do first?

A.

Implement a WAF

B.

Disable the query .php script

C.

Block brute-force attempts on temporary users

D.

Check the users table for new accounts

Which of the following allows an exploit to go undetected by the operating system?

A.

Firmware vulnerabilities

B.

Side loading

C.

Memory injection

D.

Encrypted payloads

Which of the following is a social engineering attack in which a bad actor impersonates a web URL?

A.

Pretexting

B.

Misinformation

C.

Typosquatting

D.

Watering-hole

A company is changing its mobile device policy. The company has the following requirements:

Company-owned devices

Ability to harden the devices

Reduced security risk

Compatibility with company resources

Which of the following would best meet these requirements?

A.

BYOD

B.

CYOD

C.

COPE

D.

COBO

Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

A.

Configure all systems to log scheduled tasks.

B.

Collect and monitor all traffic exiting the network.

C.

Block traffic based on known malicious signatures.

D.

Install endpoint management software on all systems.

An organization is implementing a COPE mobile device management policy. Which of the following should the organization include in the COPE policy? (Select two).

A.

Remote wiping of the device

B.

Data encryption

C.

Requiring passwords with eight characters

D.

Data usage caps

E.

Employee data ownership

F.

Personal application store access

Which of the following techniques would identify whether data has been modified in transit?

A.

Hashing

B.

Tokenization

C.

Masking

D.

Encryption

Which of the following is a risk of conducting a vulnerability assessment?

A.

A disruption of business operations

B.

Unauthorized access to the system

C.

Reports of false positives

D.

Finding security gaps in the system

Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Select two).

A.

Fencing

B.

Video surveillance

C.

Badge access

D.

Access control vestibule

E.

Sign-in sheet

F.

Sensor

Which of the following is a compensating control for providing user access to a high-risk website?

A.

Enabling threat prevention features on the firewall

B.

Configuring a SIEM tool to capture all web traffic

C.

Setting firewall rules to allow traffic from any port to that destination

D.

Blocking that website on the endpoint protection software

A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?

A.

Testing input validation on the user input fields

B.

Performing code signing on company-developed software

C.

Performing static code analysis on the software

D.

Ensuring secure cookies are use

While considering the organization's cloud-adoption strategy, the Chief Information Security Officer sets a goal to outsource patching of firmware, operating systems, and applications to the chosen cloud vendor. Which of the following best meets this goal?

A.

Community cloud

B.

PaaS

C.

Containerization

D.

Private cloud

E.

SaaS

F.

laaS

Which of the following should be used to ensure a device is inaccessible to a network-connected resource?

A.

Disablement of unused services

B.

Web application firewall

C.

Host isolation

D.

Network-based IDS

Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked.

Which of the following changes would allow users to access the site?

A.

Creating a firewall rule to allow HTTPS traffic

B.

Configuring the IPS to allow shopping

C.

Tuning the DLP rule that detects credit card data

D.

Updating the categorization in the content filter

An important patch for a critical application has just been released, and a systems administrator is identifying all of the systems requiring the patch. Which of the following must be maintained in order to ensure that all systems requiring the patch are updated?

A.

Asset inventory

B.

Network enumeration

C.

Data certification

D.

Procurement process

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?

A.

Brand impersonation

B.

Pretexting

C.

Typosquatting

D.

Phishing

Which of the following would be the most appropriate way to protect data in transit?

A.

SHA-256

B.

SSL 3.0

C.

TLS 1.3

D.

AES-256

Which of the following should a company use to provide proof of external network security testing?

A.

Business impact analysis

B.

Supply chain analysis

C.

Vulnerability assessment

D.

Third-party attestation

A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?

A.

Partition

B.

Asymmetric

C.

Full disk

D.

Database

A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.

SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?

A.

[Digital forensics

B.

E-discovery

C.

Incident response

D.

Threat hunting

Which of the following examples would be best mitigated by input sanitization?

A.

B.

nmap - 10.11.1.130

C.

Email message: "Click this link to get your free gift card."

D.

Browser message: "Your connection is not private."

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

A.

Implementing a bastion host

B.

Deploying a perimeter network

C.

Installing a WAF

D.

Utilizing single sign-on

A security analyst has determined that a security breach would have a financial impact of $15,000 and is expected to occur twice within a three-year period. Which of the following is the ALE for this risk?

A.

$7,500

B.

$10,000

C.

$15,000

D.

$30,000

Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?

A.

Insider

B.

Unskilled attacker

C.

Nation-state

D.

Hacktivist

An administrator is creating a secure method for a contractor to access a test environment. Which of the following would provide the contractor with the best access to the test environment?

A.

Application server

B.

Jump server

C.

RDP server

D.

Proxy server

Which of the following can be used to identify potential attacker activities without affecting production servers?

A.

Honey pot

B.

Video surveillance

C.

Zero Trust

D.

Geofencing

Page: 5 / 6
Total 571 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved