CompTIA Security+ SY0-701 Exam Questions in PDF

Free CompTIA SY0-701 Dumps Questions (page: 1)

A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?

  1. Accept
  2. Transfer
  3. Mitigate
  4. Avoid

Answer(s): B

Explanation:

Option B is correct because transferring risk via cyber insurance shifts financial impact of a threat from the organization to an insurer, aligning with risk transfer strategy. A (Accept) would mean acknowledging the risk without action; not applicable since insurance is a transfer mechanism. C (Mitigate) involves reducing likelihood or impact through controls, not shifting costs. D (Avoid) means not engaging in the activity that creates risk; insurance does not eliminate the risk itself. Therefore, insurance serves as a risk transfer remedy rather than acceptance, mitigation, or avoidance.



Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

  1. Risk tolerance
  2. Risk transfer
  3. Risk register
  4. Risk analysis

Answer(s): C

Explanation:

Option C is correct because a risk register documents risks, assigns responsible parties, and defines risk thresholds and treatment actions.
A) Incorrect — Risk tolerance describes the organization’s overall appetite for risk, not a ledger of risks or owners.
B) Incorrect — Risk transfer is a treatment option (e.g., insurance) rather than a documentation artifact.
D) Incorrect — Risk analysis assesses likelihood and impact but does not establish ownership or thresholds in a formal register.



HOTSPOT (Drag and Drop is not supported)

You are a security administrator investigating a potential infection on a network.

INSTRUCTIONS

Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.













Hot Area:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems. Which of the following scenarios describes this activity?

  1. Espionage
  2. Data exfiltration
  3. Nation-state attack
  4. Shadow IT

Answer(s): D

Explanation:

Option D is correct because Shadow IT refers to employees using unsanctioned tools or solutions, such as bypassing the VPN, to access services, often without IT oversight. Incorrect — A) Espionage implies covert information gathering by attackers, not internal R&D bypassing VPN. Incorrect — B) Data exfiltration involves unauthorized data transfer, not the act of using unauthorized tools itself. Incorrect — C) Nation-state attack denotes a political or strategic attacker; not applicable to internal department bypass of VPN.



Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

  1. Unidentified removable devices
  2. Default network device credentials
  3. Spear phishing emails
  4. Impersonation of business units through typosquatting

Answer(s): A

Explanation:

Option A is correct because insiders often use removable media or devices to exfiltrate data, leveraging physical access and trusted insider status to copy information off-network.
B is incorrect because default network device credentials are a common hardening issue for attackers externally or due to poor onboarding, not a typical insider-driven exfiltration vector.
C is incorrect because spear phishing targets external adversaries to gain initial access, not primarily an insider exfiltration method.
D is incorrect because typosquatting impersonates brands to deceive external users; it does not reflect a standard insider data exfiltration technique.



Which of the following agreement types defines the time frame in which a vendor needs to respond?

  1. SOW
  2. SLA
  3. MOA
  4. MOU

Answer(s): B

Explanation:

Option B is correct because a Service Level Agreement (SLA) defines performance metrics and response times for vendor services, including incident response and uptime commitments. A) SOW (Statement of Work) outlines scope and deliverables, not response time. C) MOA (Memorandum of Agreement) is a high-level collaboration document, not time frames. D) MOU (Memorandum of Understanding) is a non-binding agreement outlining intent, not specific response windows. Correct — SLA explicitly specifies the required response time and performance levels in a formal contractual metric.



Which of the following is a feature of a next-generation SIEM system?

  1. Virus signatures
  2. Automated response actions
  3. Security agent deployment
  4. Vulnerability scanning

Answer(s): B

Explanation:

Option B is correct because next-generation SIEMs integrate automated response actions (SOAR-like capabilities) to orchestrate containment, remediation, and workflow across tools. A) Virus signatures are legacy antivirus content, not central to NG SIEMs. C) Security agent deployment is a deployment consideration, not a NG SIEM feature. D) Vulnerability scanning is typically a separate function from SIEMs; NG SIEMs focus on detection, correlation, and automated response rather than initial vulnerability assessment.



To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed. Which of the following best describe these types of controls? (Choose two.)

  1. Preventive
  2. Deterrent
  3. Corrective
  4. Directive
  5. Compensating
  6. Detective

Answer(s): B,F

Explanation:

Option B is correct because deterrent controls aim to discourage criminal activity by increasing the likelihood of being observed (CCTV) and signaling monitoring through signs. Option F is correct because detective controls identify and detect security incidents (CCTV footage).
A) Incorrect — Preventive controls aim to prevent incidents from occurring (e.g., access control, locks), not just deter or detect.
C) Incorrect — Corrective controls respond after a breach to restore state, not to deter or detect.
D) Incorrect — Directive controls guide behavior and governance, not detection or deterrence.
E) Incorrect — Compensating controls provide an alternative security measure when a primary control is not feasible, not specifically deterrence/detection.
F) (already cited)



Share your comments for CompTIA SY0-701 exam with other users:

R
RAWI
7/9/2023 4:54:00 AM

is this dump still valid? today is 9-july-2023

A
Annie
6/7/2023 3:46:00 AM

i need this exam.. please upload these are really helpful

S
Shubhra Rathi
8/26/2023 1:08:00 PM

please upload the oracle 1z0-1059-22 dumps

S
Shiji
10/15/2023 1:34:00 PM

very good questions

R
Rita Rony
11/27/2023 1:36:00 PM

nice, first step to exams

A
Aloke Paul
9/11/2023 6:53:00 AM

is this valid for chfiv9 as well... as i am reker 3rd time...

C
Calbert Francis
1/15/2024 8:19:00 PM

great exam for people taking 220-1101

A
Ayushi Baria
11/7/2023 7:44:00 AM

this is very helpfull for me

A
alma
8/25/2023 1:20:00 PM

just started preparing for the exam

C
CW
7/10/2023 6:46:00 PM

these are the type of questions i need.

N
Nobody
8/30/2023 9:54:00 PM

does this actually work? are they the exam questions and answers word for word?

S
Salah
7/23/2023 9:46:00 AM

thanks for providing these questions

R
Ritu
9/15/2023 5:55:00 AM

interesting

R
Ron
5/30/2023 8:33:00 AM

these dumps are pretty good.

S
Sowl
8/10/2023 6:22:00 PM

good questions

B
Blessious Phiri
8/15/2023 2:02:00 PM

dbua is used for upgrading oracle database

R
Richard
10/24/2023 6:12:00 AM

i am thrilled to say that i passed my amazon web services mls-c01 exam, thanks to study materials. they were comprehensive and well-structured, making my preparation efficient.

J
Janjua
5/22/2023 3:31:00 PM

please upload latest ibm ace c1000-056 dumps

M
Matt
12/30/2023 11:18:00 AM

if only explanations were provided...

R
Rasha
6/29/2023 8:23:00 PM

yes .. i need the dump if you can help me

A
Anonymous
7/25/2023 8:05:00 AM

good morning, could you please upload this exam again?

A
AJ
9/24/2023 9:32:00 AM

hi please upload sre foundation and practitioner exam questions

P
peter parker
8/10/2023 10:59:00 AM

the exam is listed as 80 questions with a pass mark of 70%, how is your 50 questions related?

B
Berihun
7/13/2023 7:29:00 AM

all questions are so important and covers all ccna modules

N
nspk
1/19/2024 12:53:00 AM

q 44. ans:- b (goto setup > order settings > select enable optional price books for orders) reference link --> https://resources.docs.salesforce.com/latest/latest/en-us/sfdc/pdf/sfom_impl_b2b_b2b2c.pdf(decide whether you want to enable the optional price books feature. if so, select enable optional price books for orders. you can use orders in salesforce while managing price books in an external platform. if you’re using d2c commerce, you must select enable optional price books for orders.)

M
Muhammad Rawish Siddiqui
12/2/2023 5:28:00 AM

"cost of replacing data if it were lost" is also correct.

A
Anonymous
7/14/2023 3:17:00 AM

pls upload the questions

M
Mukesh
7/10/2023 4:14:00 PM

good questions

E
Elie Abou Chrouch
12/11/2023 3:38:00 AM

question 182 - correct answer is d. ethernet frame length is 64 - 1518b. length of user data containing is that frame: 46 - 1500b.

D
Damien
9/23/2023 8:37:00 AM

i need this exam pls

N
Nani
9/10/2023 12:02:00 PM

its required for me, please make it enable to access. thanks

E
ethiopia
8/2/2023 2:18:00 AM

seems good..

W
whoAreWeReally
12/19/2023 8:29:00 PM

took the test last week, i did have about 15 - 20 word for word from this site on the test. (only was able to cram 600 of the questions from this site so maybe more were there i didnt review) had 4 labs, bgp, lacp, vrf with tunnels and actually had to skip a lab due to time. lots of automation syntax questions.

V
vs
9/2/2023 12:19:00 PM

no comments

AI Tutor 👋 I’m here to help!