ExamGecko
Home Home / CompTIA / SY0-701

CompTIA SY0-701 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?

A.
Hacktivist
A.
Hacktivist
Answers
B.
Whistleblower
B.
Whistleblower
Answers
C.
Organized crime
C.
Organized crime
Most voted
Answers (6)
Most voted
D.
Unskilled attacker
D.
Unskilled attacker
Answers
Suggested answer: C

Explanation:

Organized crime is a type of threat actor that is motivated by financial gain and often operates across national borders. Organized crime groups may be hired by foreign governments to conduct cyberattacks on critical systems located in other countries, such as power grids, military networks, or financial institutions.Organized crime groups have the resources, skills, and connections to carry out sophisticated and persistent attacks that can cause significant damage and disruption12.Reference=1: Threat Actors - CompTIA Security+ SY0-701 - 2.12: CompTIA Security+ SY0-701 Certification Study Guide

Which of the following is used to add extra complexity before using a one-way data transformation algorithm?

A.
Key stretching
A.
Key stretching
Answers
B.
Data masking
B.
Data masking
Answers
C.
Steganography
C.
Steganography
Answers
D.
Salting
D.
Salting
Most voted
Answers (4)
Most voted
Suggested answer: D

Explanation:

Salting is the process of adding extra random data to a password or other data before applying a one-way data transformation algorithm, such as a hash function. Salting increases the complexity and randomness of the input data, making it harder for attackers to guess or crack the original data using precomputed tables or brute force methods. Salting also helps prevent identical passwords from producing identical hash values, which could reveal the passwords to attackers who have access to the hashed data. Salting is commonly used to protect passwords stored in databases or transmitted over networks.

Reference= Passwords technical overview

Encryption, hashing, salting -- what's the difference?

Salt (cryptography)

Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?

A.
Compensating control
A.
Compensating control
Most voted
Answers (3)
Most voted
B.
Network segmentation
B.
Network segmentation
Answers
C.
Transfer of risk
C.
Transfer of risk
Answers
D.
SNMP traps
D.
SNMP traps
Answers
Suggested answer: A

Explanation:

A compensating control is a security measure that is implemented to mitigate the risk of a vulnerability or a weakness that cannot be resolved by the primary control. A compensating control does not prevent or eliminate the vulnerability or weakness, but it can reduce the likelihood or impact of an attack. A host-based firewall on a legacy Linux system that allows connections from only specific internal IP addresses is an example of a compensating control, as it can limit the exposure of the system to potential threats from external or unauthorized sources. A host-based firewall is a software application that monitors and filters the incoming and outgoing network traffic on a single host, based on a set of rules or policies. A legacy Linux system is an older version of the Linux operating system that may not be compatible with the latest security updates or patches, and may have known vulnerabilities or weaknesses that could be exploited by attackers.Reference=Security Controls -- SY0-601 CompTIA Security+ : 5.1,Security Controls -- CompTIA Security+ SY0-501 -- 5.7,CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701, 9th Edition, Chapter 5, page 240. CompTIA Security+ (SY0-701) Certification Exam Objectives, Domain 5.1, page 18.

The management team notices that new accounts that are set up manually do not always have correct access or permissions.

Which of the following automation techniques should a systems administrator use to streamline account creation?

A.
Guard rail script
A.
Guard rail script
Answers
B.
Ticketing workflow
B.
Ticketing workflow
Answers
C.
Escalation script
C.
Escalation script
Answers
D.
User provisioning script
D.
User provisioning script
Most voted
Answers (3)
Most voted
Suggested answer: D

Explanation:

A user provisioning script is an automation technique that uses a predefined set of instructions or commands to create, modify, or delete user accounts and assign appropriate access or permissions.A user provisioning script can help to streamline account creation by reducing manual errors, ensuring consistency and compliance, and saving time and resources12.

The other options are not automation techniques that can streamline account creation:

Guard rail script: This is a script that monitors and enforces the security policies and rules on a system or a network.A guard rail script can help to prevent unauthorized or malicious actions, such as changing security settings, accessing restricted resources, or installing unwanted software3.

Ticketing workflow: This is a process that tracks and manages the requests, issues, or incidents that are reported by users or customers.A ticketing workflow can help to improve the communication, collaboration, and resolution of problems, but it does not automate the account creation process4.

Escalation script: This is a script that triggers an alert or a notification when a certain condition or threshold is met or exceeded. An escalation script can help to inform the relevant parties or authorities of a critical situation, such as a security breach, a performance degradation, or a service outage.

Reference=1: CompTIA Security+ SY0-701 Certification Study Guide, page 1022: User Provisioning -- CompTIA Security+ SY0-701 -- 5.1, video by Professor Messer3: CompTIA Security+ SY0-701 Certification Study Guide, page 1034: CompTIA Security+ SY0-701 Certification Study Guide, page 104. : CompTIA Security+ SY0-701 Certification Study Guide, page 105.

Which of the following involves an attempt to take advantage of database misconfigurations?

A.
Buffer overflow
A.
Buffer overflow
Answers
B.
SQL injection
B.
SQL injection
Most voted
Answers (3)
Most voted
C.
VM escape
C.
VM escape
Answers
D.
Memory injection
D.
Memory injection
Answers
Suggested answer: B

Explanation:

SQL injection is a type of attack that exploits a database misconfiguration or a flaw in the application code that interacts with the database. An attacker can inject malicious SQL statements into the user input fields or the URL parameters that are sent to the database server. These statements can then execute unauthorized commands, such as reading, modifying, deleting, or creating data, or even taking over the database server.SQL injection can compromise the confidentiality, integrity, and availability of the data and the system.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 2151

An organization would like to store customer data on a separate part of the network that is not accessible to users on the main corporate network. Which of the following should the administrator use to accomplish this goal?

A.
Segmentation
A.
Segmentation
Most voted
Answers (4)
Most voted
B.
Isolation
B.
Isolation
Answers
C.
Patching
C.
Patching
Answers
D.
Encryption
D.
Encryption
Answers
Suggested answer: A

Explanation:

Segmentation is a network design technique that divides the network into smaller and isolated segments based on logical or physical boundaries. Segmentation can help improve network security by limiting the scope of an attack, reducing the attack surface, and enforcing access control policies. Segmentation can also enhance network performance, scalability, and manageability.To accomplish the goal of storing customer data on a separate part of the network, the administrator can use segmentation technologies such as subnetting, VLANs, firewalls, routers, or switches.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 308-3091

Which of the following is used to quantitatively measure the criticality of a vulnerability?

A.
CVE
A.
CVE
Answers
B.
CVSS
B.
CVSS
Most voted
Answers (1)
Most voted
C.
CIA
C.
CIA
Answers
D.
CERT
D.
CERT
Answers
Suggested answer: B

Explanation:

CVSS stands for Common Vulnerability Scoring System, which is a framework that provides a standardized way to assess and communicate the severity and risk of vulnerabilities. CVSS uses a set of metrics and formulas to calculate a numerical score ranging from 0 to 10, where higher scores indicate higher criticality. CVSS can help organizations prioritize remediation efforts and compare vulnerabilities across different systems and vendors.The other options are not used to measure the criticality of a vulnerability, but rather to identify, classify, or report them.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 39

A technician is opening ports on a firewall for a new system being deployed and supported by a SaaS provider. Which of the following is a risk in the new system?

A.
Default credentials
A.
Default credentials
Most voted
Answers (2)
Most voted
B.
Non-segmented network
B.
Non-segmented network
Answers
C.
Supply chain vendor
C.
Supply chain vendor
Answers
D.
Vulnerable software
D.
Vulnerable software
Answers
Suggested answer: C

Explanation:

A supply chain vendor is a third-party entity that provides goods or services to an organization, such as a SaaS provider. A supply chain vendor can pose a risk to the new system if the vendor has poor security practices, breaches, or compromises that could affect the confidentiality, integrity, or availability of the system or its data. The organization should perform due diligence and establish a service level agreement with the vendor to mitigate this risk. The other options are not specific to the scenario of using a SaaS provider, but rather general risks that could apply to any system.

Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?

A.
Integrity
A.
Integrity
Answers
B.
Availability
B.
Availability
Answers
C.
Confidentiality
C.
Confidentiality
Most voted
Answers (4)
Most voted
D.
Non-repudiation
D.
Non-repudiation
Answers
Suggested answer: C

Explanation:

Confidentiality is the security concept that ensures data is protected from unauthorized access or disclosure. The principle of least privilege is a technique that grants users or systems the minimum level of access or permissions that they need to perform their tasks, and nothing more. By applying the principle of least privilege to a human resources fileshare, the permissions can be restricted to only those who have a legitimate need to access the sensitive data, such as HR staff, managers, or auditors. This can prevent unauthorized users, such as hackers, employees, or contractors, from accessing, copying, modifying, or deleting the data. Therefore, the principle of least privilege can enhance the confidentiality of the data on the fileshare. Integrity, availability, and non-repudiation are other security concepts, but they are not the best reason for permissions on a human resources fileshare to follow the principle of least privilege. Integrity is the security concept that ensures data is accurate and consistent, and protected from unauthorized modification or corruption. Availability is the security concept that ensures data is accessible and usable by authorized users or systems when needed. Non-repudiation is the security concept that ensures the authenticity and accountability of data and actions, and prevents the denial of involvement or responsibility. While these concepts are also important for data security, they are not directly related to the level of access or permissions granted to users or systems.

Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 16-17, 372-373

A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?

A.
Corrective
A.
Corrective
Answers
B.
Preventive
B.
Preventive
Answers
C.
Detective
C.
Detective
Most voted
Answers (2)
Most voted
D.
Deterrent
D.
Deterrent
Answers
Suggested answer: C

Explanation:

A detective control is a type of control that monitors and analyzes the events and activities in a system or a network, and alerts or reports when an incident or a violation occurs. A SIEM (Security Information and Event Management) system is a tool that collects, correlates, and analyzes the logs from various sources, such as firewalls, routers, servers, or applications, and provides a centralized view of the security status and incidents. An analyst who reviews the logs on a weekly basis can identify and investigate any anomalies, trends, or patterns that indicate a potential threat or a breach. A detective control can help the company to respond quickly and effectively to the incidents, and to improve its security posture and resilience.Reference=CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701, 9th Edition, Chapter 1, page 23. CompTIA Security+ SY0-701 Exam Objectives, Domain 4.3, page 14.

Total 350 questions
Go to page: of 35