CompTIA SY0-701 CompTIA Security+ Online Training
CompTIA SY0-701 Online Training
The questions for SY0-701 were last updated at Jul 16,2025.
- Exam Code: SY0-701
- Exam Name: CompTIA Security+
- Certification Provider: CompTIA
- Latest update: Jul 16,2025
A healthcare organization wants to provide a web application that allows individuals to digitally report health emergencies.
Which of the following is the most important consideration during development?
- A . Scalability
- B . Availability
- C . Cost
- D . Ease of deployment
An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device.
Which of the following best describes this kind of penetration test?
- A . Partially known environment
- B . Unknown environment
- C . Integrated
- D . Known environment
An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards.
Which of the following techniques is the attacker using?
- A . Smishing
- B . Disinformation
- C . Impersonating
- D . Whaling
An analyst is evaluating the implementation of Zero Trust principles within the data plane.
Which of the following would be most relevant for the analyst to evaluate?
- A . Secured zones
- B . Subject role
- C . Adaptive identity
- D . Threat scope reduction
An organization is leveraging a VPN between its headquarters and a branch location.
Which of the following is the VPN protecting?
- A . Data in use
- B . Data in transit
- C . Geographic restrictions
- D . Data sovereignty
The marketing department set up its own project management software without telling the appropriate departments.
Which of the following describes this scenario?
- A . Shadow IT
- B . Insider threat
- C . Data exfiltration
- D . Service disruption
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25.
Which of the following firewall ACLs will accomplish this goal?
- A . Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53 - B . Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53 - C . Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53 - D . Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
After a security incident, a systems administrator asks the company to buy a NAC platform.
Which of the following attack surfaces is the systems administrator trying to protect?
- A . Bluetooth
- B . Wired
- C . NFC
- D . SCADA
Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).
- A . Channels by which the organization communicates with customers
- B . The reporting mechanisms for ethics violations
- C . Threat vectors based on the industry in which the organization operates
- D . Secure software development training for all personnel
- E . Cadence and duration of training events
- F . Retraining requirements for individuals who fail phishing simulations
An organization disabled unneeded services and placed a firewall in front of a business-critical legacy system.
Which of the following best describes the actions taken by the organization?
- A . Exception
- B . Segmentation
- C . Risk transfer
- D . Compensating controls