CompTIA Security+ SY0-701 Exam Questions in PDF

Free CompTIA SY0-701 Dumps Questions (page: 3)

A company allows customers to upload PDF documents to its public e-commerce website. Which of the following would a security analyst most likely recommend?

  1. Utilizing attack signatures in an IDS
  2. Enabling malware detection through a UTM
  3. Limiting the affected servers with a load balancer
  4. Blocking command injections via a WAF

Answer(s): B

Explanation:

Option B is correct because enabling malware detection through a UTM provides comprehensive protection for file uploads by inspecting content and detecting malicious payloads across the network boundary, which is appropriate for preventing malware in PDFs from reaching internal systems.
A) Incorrect — attack signatures in an IDS detect known threats on the network but do not actively scan uploads for malware at the perimeter with PDF content.
C) Incorrect — a load balancer limits traffic distribution, not malware payload inspection or detection.
D) Incorrect — a WAF blocks web app attacks like SQLi or XSS but there is no explicit focus on detecting malware in uploaded PDFs.



A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?

  1. To reduce implementation cost
  2. To identify complexity
  3. To remediate technical debt
  4. To prevent a single point of failure

Answer(s): D

Explanation:

Option D is correct because ensuring others understand the script reduces the risk of a single point of failure: if only one person knows how it works, outages or knowledge loss can halt automation. A) To reduce implementation cost is not directly about sharing knowledge; costs may vary. B) To identify complexity could be a byproduct but the primary benefit here is resilience against reliance on one person. C) To remediate technical debt involves addressing suboptimal code, not primarily collaboration or redundancy. INSUFFICIENT_KNOWLEDGE is not appropriate since the reasoning above is solid.



A company is decommissioning its physical servers and replacing them with an architecture that will reduce the number of individual operating systems. Which of the following strategies should the company use to achieve this security requirement?

  1. Microservices
  2. Containerization
  3. Virtualization
  4. Infrastructure as code

Answer(s): B

Explanation:

Option B is correct because containerization reduces the number of distinct OS instances by packaging applications with their dependencies in isolated containers, improving security through process isolation and easier patching. A) Microservices describe an architectural style, not a OS reduction strategy. C) Virtualization creates multiple VMs with separate OS instances, increasing OS count. D) Infrastructure as code is about managing infrastructure declaratively, not reducing OS instances.



An administrator needs to perform server hardening before deployment. Which of the following steps should the administrator take? (Choose two.)

  1. Disable default accounts.
  2. Add the server to the asset inventory.
  3. Remove unnecessary services.
  4. Document default passwords.
  5. Send server logs to the SIEM.
  6. Join the server to the corporate domain.

Answer(s): A,C

Explanation:

Option A is correct because disabling default accounts reduces attack surface and prevents common credential abuse.
Option C is correct because removing unnecessary services minimizes exposure, reduces potential vulnerabilities, and lowers maintenance risk.
B is incorrect because adding to asset inventory is a best practice but not a hardening action per se; it does not directly reduce attack surface.
D is incorrect because documenting default passwords is insecure; passwords should be changed or securely managed, not documented.
E is incorrect because forwarding logs to a SIEM is logging/monitoring, not a hardening step.
F is incorrect because joining to the domain is a configuration decision, not a core hardening action.



A Chief Information Security Officer would like to conduct frequent, detailed reviews of systems and procedures

to track compliance objectives. Which of the following will be the best method to achieve this objective?

  1. Third-party attestation
  2. Penetration testing
  3. Internal auditing
  4. Vulnerability scans

Answer(s): C

Explanation:

Option C is correct because internal auditing provides ongoing, formal reviews of processes, controls, and compliance objectives within an organization, enabling frequent assessments and independent assurance. A) Third-party attestation can validate controls but is external and not continuous. B) Penetration testing simulates attacks to find exploitable vulnerabilities, not a routine compliance review. D) Vulnerability scans identify known weaknesses but do not assess procedural adherence or control effectiveness across the organization.



Which of the following security concepts is accomplished with the installation of a RADIUS server?

  1. CIA
  2. AAA
  3. ACL
  4. PEM

Answer(s): B

Explanation:

Option B is correct because a RADIUS server provides Authentication, Authorization, and Accounting (AAA) services for centralized access control.
A) CIA is not specifically accomplished by RADIUS; confidentiality, integrity, and availability are broader objectives of security but not uniquely implemented by RADIUS.
C) ACLs are access control lists used on devices to permit/deny traffic, not a RADIUS service.
D) PEM refers to Privacy-Enhanced Mail or a certificate/key container format, not a RADIUS-based AAA solution.



After creating a contract for IT contractors, the human resources department changed several clauses. The contract has gone through three revisions. Which of the following processes should the human resources department follow to track revisions?

  1. Version validation
  2. Version changes
  3. Version updates
  4. Version control

Answer(s): D

Explanation:

Option D is correct because version control tracks changes to documents, preserves history, and supports auditability across revisions, which is essential for contractual documents with multiple revisions. Incorrect — A (version validation) implies checking validity of a version, not tracking changes. Incorrect — B (version changes) describes changes themselves, not the mechanism to manage versions. Incorrect — C (version updates) suggests updating versions but not the formal system that records all revisions and authors.



The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available. Which of the following would be the best option?

  1. Hot site
  2. Cold site
  3. Failover site
  4. Warm site

Answer(s): B

Explanation:

Option B is correct because a cold site provides minimal facility with basic power, cooling, and space but requires the longest time to recover and lowest ongoing costs, aligning with a low-cost DR strategy. A) Hot site is immediately usable with full replication and high cost, not suitable when funds are limited. C) Failover site is not a standard DR site type; it’s a process/ capability term often implying automatic switching, not a facility option. D) Warm site requires more infrastructure and faster failover than cold but higher cost than a cold site, which contradicts the cost constraint.



Share your comments for CompTIA SY0-701 exam with other users:

D
Deno
10/25/2023 1:14:00 AM

i failed the cisa exam today. but i have found all the questions that were on the exam to be on this site.

C
CiscoStudent
11/15/2023 5:29:00 AM

in question 272 the right answer states that an autonomous acces point is "configured and managed by the wlc" but this is not what i have learned in my ccna course. is this a mistake? i understand that lightweight aps are managed by wlc while autonomous work as standalones on the wlan.

P
pankaj
9/28/2023 4:36:00 AM

it was helpful

U
User123
10/8/2023 9:59:00 AM

good question

V
vinay
9/4/2023 10:23:00 AM

really nice

U
Usman
8/28/2023 10:07:00 AM

please i need dumps for isc2 cybersecuity

Q
Q44
7/30/2023 11:50:00 AM

ans is coldline i think

A
Anuj
12/21/2023 1:30:00 PM

very helpful

G
Giri
9/13/2023 10:31:00 PM

can you please provide dumps so that it helps me more

A
Aaron
2/8/2023 12:10:00 AM

thank you for providing me with the updated question and answers. this version has all the questions from the exam. i just saw them in my exam this morning. i passed my exam today.

S
Sarwar
12/21/2023 4:54:00 PM

how i can see exam questions?

C
Chengchaone
9/11/2023 10:22:00 AM

can you please upload please?

M
Mouli
9/2/2023 7:02:00 AM

question 75: option c is correct answer

J
JugHead
9/27/2023 2:40:00 PM

please add this exam

S
sushant
6/28/2023 4:38:00 AM

please upoad

J
John
8/7/2023 12:09:00 AM

has anyone recently attended safe 6.0 certification? is it the samq question from here.

B
Blessious Phiri
8/14/2023 3:49:00 PM

expository experience

C
concerned citizen
12/29/2023 11:31:00 AM

52 should be b&c. controller failure has nothing to do with this type of issue. degraded state tells us its a raid issue, and if the os is missing then the bootable device isnt found. the only other consideration could be data loss but thats somewhat broad whereas b&c show understanding of the specific issues the question is asking about.

D
deedee
12/23/2023 5:10:00 PM

great help!!!

S
Samir
8/1/2023 3:07:00 PM

very useful tools

S
Saeed
11/7/2023 3:14:00 AM

looks a good platform to prepare az-104

M
Matiullah
6/24/2023 7:37:00 AM

want to pass the exam

S
SN
9/5/2023 2:25:00 PM

good resource

Z
Zoubeyr
9/8/2023 5:56:00 AM

question 11 : d

U
User
8/29/2023 3:24:00 AM

only the free dumps will be enough for pass, or have to purchase the premium one. please suggest.

C
CW
7/6/2023 7:37:00 PM

good questions. thanks.

F
Farooqi
11/21/2023 1:37:00 AM

good for practice.

I
Isaac
10/28/2023 2:30:00 PM

great case study

M
Malviya
2/3/2023 9:10:00 AM

the questions in this exam dumps is valid. i passed my test last monday. i only whish they had their pricing in inr instead of usd. but it is still worth it.

R
rsmyth
5/18/2023 12:44:00 PM

q40 the answer is not d, why are you giving incorrect answers? snapshot consolidation is used to merge the snapshot delta disk files to the vm base disk

K
Keny
6/23/2023 9:00:00 PM

thanks, very relevant

M
Muhammad Rawish Siddiqui
11/29/2023 12:14:00 PM

wrong answer. it is true not false.

J
Josh
7/10/2023 1:54:00 PM

please i need the mo-100 questions

V
VINNY
6/2/2023 11:59:00 AM

very good use full

AI Tutor 👋 I’m here to help!