CompTIA SY0-701 Exam (page: 3)
CompTIA Security+
Updated on: 31-Mar-2026

Viewing Page 3 of 91

A company allows customers to upload PDF documents to its public e-commerce website.
Which of the following would a security analyst most likely recommend?

  1. Utilizing attack signatures in an IDS
  2. Enabling malware detection through a UTM
  3. Limiting the affected servers with a load balancer
  4. Blocking command injections via a WAF

Answer(s): B

Explanation:

A) Enabling malware detection through a UTM best addresses protecting file uploads by inspecting content for malware at the network edge, reducing risk from PDFs containing malware before reaching hosts.
B) Incorrect: Blocking command injections via a WAF focuses on input validation for web apps, not general malware in uploaded PDFs; while helpful for input-based attacks, it’s not as comprehensive for uploaded file scanning as a UTM’s malware signature/id-based detection.
C) Limiting affected servers with a load balancer helps availability and segmentation but does not detect or scan uploaded PDFs for malware.
D) Utilizing attack signatures in an IDS detects known network attacks but is not effective for inspecting individual uploaded files for malware.


Reference:



A security analyst developed a script to automate a trivial and repeatable task.
Which of the following best describes the benefits of ensuring other team members understand how the script works?

  1. To reduce implementation cost
  2. To identify complexity
  3. To remediate technical debt
  4. To prevent a single point of failure

Answer(s): D

Explanation:

A) D is correct because ensuring others understand the script reduces reliance on a single individual and avoids a single point of failure, promoting cross-team knowledge and continuity. B) Identifying complexity is useful, but the primary benefit here is resilience through shared understanding, not merely recognizing complexity. C) Remediating technical debt involves addressing long-term quality and maintainability; while helpful, it is not the main reason for team-wide understanding in this scenario. E) The option list has no E; among given options, A) to reduce implementation cost is not as strong as preventing a single point of failure.


Reference:



A company is decommissioning its physical servers and replacing them with an architecture that will reduce the number of individual operating systems.
Which of the following strategies should the company use to achieve this security requirement?

  1. Microservices
  2. Containerization
  3. Virtualization
  4. Infrastructure as code

Answer(s): B

Explanation:

Containerization is the correct approach because it consolidates workloads into isolated containers, reducing the number of separate OS instances while maintaining process isolation and consistent security boundaries. It enables lightweight, portable deployment across hosts, lowering attack surface and simplifying patch management.
A) Microservices - While compatible with containerization, microservices describes an architectural style, not a deployment mechanism to reduce OS instances.
C) Virtualization - Increases the number of OS instances (each VM runs its own OS), opposite of the goal.
D) Infrastructure as code - Automates provisioning, not specifically reducing OS counts or isolation boundaries.


Reference:



An administrator needs to perform server hardening before deployment.
Which of the following steps should the administrator take? (Choose two.)

  1. Disable default accounts.
  2. Add the server to the asset inventory.
  3. Remove unnecessary services.
  4. Document default passwords.
  5. Send server logs to the SIEM.
  6. Join the server to the corporate domain.

Answer(s): A,C

Explanation:

A) Disabling default accounts prevents attackers from using well-known credentials to gain initial access.
C) Removing unnecessary services reduces the attack surface by limiting exploitable functionality.
B) Adding the server to asset inventory is a good practice but not a hardening step per se.
D) Documenting default passwords is risky and counterproductive; change or remove defaults.
E) Sending logs to SIEM aids monitoring, not a hardening action.
F) Joining to a domain is deployment/management but not a direct hardening step; could introduce additional risks if misconfigured.


Reference:



A Chief Information Security Officer would like to conduct frequent, detailed reviews of systems and procedures to track compliance objectives.
Which of the following will be the best method to achieve this objective?

  1. Third-party attestation
  2. Penetration testing
  3. Internal auditing
  4. Vulnerability scans

Answer(s): C

Explanation:

A) Internal auditing provides ongoing, formal reviews of controls and procedures to verify compliance objectives and governance, meeting frequent assessment needs.
B) Penetration testing simulates external attacks to find exploitable flaws, not a broad compliance review.
C) Internal auditing is correct: systematic evaluation of controls, policies, and procedures to ensure compliance with standards and objectives.
D) Vulnerability scans identify known weaknesses but do not assess adherence to policies or governance requirements, nor provide comprehensive compliance evidence.


Reference:



Which of the following security concepts is accomplished with the installation of a RADIUS server?

  1. CIA
  2. AAA
  3. ACL
  4. PEM

Answer(s): B

Explanation:

A RADIUS server provides centralized AAA (Authentication, Authorization, and Accounting) services for network access, enabling verification, policy enforcement, and session tracking. B is correct. A) CIA is a confidentiality, integrity, availability model not specifically implemented by RADIUS. C) ACLs are access control lists used to permit or deny traffic, not the primary function of a RADIUS server. D) PEM refers to privacy-enhanced mail or certificate formats, not a security concept tied to RADIUS functionality.


Reference:



After creating a contract for IT contractors, the human resources department changed several clauses. The contract has gone through three revisions.
Which of the following processes should the human resources department follow to track revisions?

  1. Version validation
  2. Version changes
  3. Version updates
  4. Version control

Answer(s): D

Explanation:

A clear version control process tracks, documents, and audits all revisions to contracts, enabling rollback and accountability across multiple revisions. A) Version validation is not a standard term for tracking changes. B) Version changes implies changes occur but lacks the formal mechanism and history tracking. C) Version updates suggests updating but not preserving a complete change history. D) Version control provides a structured system (check-in/check-out, changelogs, permissions) to manage contract revisions across three iterations.


Reference:



The executive management team is mandating the company develop a disaster recovery plan. The cost must be kept to a minimum, and the money to fund additional internet connections is not available.
Which of the following would be the best option?

  1. Hot site
  2. Cold site
  3. Failover site
  4. Warm site

Answer(s): B

Explanation:

A cold site provides DR capability at the lowest ongoing cost by providing space and basic infrastructure without active systems, meeting the requirement to minimize costs and without funding extra internet connections.
A) Hot site is expensive with immediate readiness and active systems, not aligning with cost constraints.
C) Failover site is not a standard DR option and could imply dynamic switching; it’s not the commonly defined DR facility type.
D) Warm site has partial readiness and some pre-installed equipment, but typically costs more than a cold site and may require bandwidth setup.


Reference:



Viewing Page 3 of 91



Share your comments for CompTIA SY0-701 exam with other users:

ribrahim 8/1/2023 6:05:00 AM

hey guys, just to let you all know that i cleared my 312-38 today within 1 hr with 100 questions and passed. thank you so much brain-dumps.net all the questions that ive studied in this dump came out exactly the same word for word "verbatim". you rock brain-dumps.net!!! section name total score gained score network perimeter protection 16 11 incident response 10 8 enterprise virtual, cloud, and wireless network protection 12 8 application and data protection 13 10 network défense management 10 9 endpoint protection 15 12 incident d
SINGAPORE


Andrew 8/23/2023 6:02:00 PM

very helpful
Anonymous


latha 9/7/2023 8:14:00 AM

useful questions
GERMANY


ibrahim 11/9/2023 7:57:00 AM

page :20 https://exam-dumps.com/snowflake/free-cof-c02-braindumps.html?p=20#collapse_453 q 74: true or false: pipes can be suspended and resumed. true. desc.: pausing or resuming pipes in addition to the pipe owner, a role that has the following minimum permissions can pause or resume the pipe https://docs.snowflake.com/en/user-guide/data-load-snowpipe-intro
FINLAND


Franklin Allagoa 7/5/2023 5:16:00 AM

i want hcia exam dumps
Anonymous


SSA 12/24/2023 1:18:00 PM

good training
Anonymous


BK 8/11/2023 12:23:00 PM

very useful
INDIA


Deepika Narayanan 7/13/2023 11:05:00 PM

yes need this exam dumps
Anonymous


Blessious Phiri 8/15/2023 3:31:00 PM

these questions are a great eye opener
Anonymous


Jagdesh 9/8/2023 8:17:00 AM

thank you for providing these questions and answers. they helped me pass my exam. you guys are great.
CANADA


TS 7/18/2023 3:32:00 PM

good knowledge
Anonymous


Asad Khan 11/1/2023 2:44:00 AM

answer 10 should be a because only a new project will be created & the organization is the same.
Anonymous


Raj 9/12/2023 3:49:00 PM

can you please upload the dump again
UNITED STATES


Christian Klein 6/23/2023 1:32:00 PM

is it legit questions from sap certifications ?
UNITED STATES


anonymous 1/12/2024 3:34:00 PM

question 16 should be b (changing the connector settings on the monitor) pc and monitor were powered on. the lights on the pc are on indicating power. the monitor is showing an error text indicating that it is receiving power too. this is a clear sign of having the wrong input selected on the monitor. thus, the "connector setting" needs to be switched from hdmi to display port on the monitor so it receives the signal from the pc, or the other way around (display port to hdmi).
UNITED STATES


NSPK 1/18/2024 10:26:00 AM

q 10. ans is d (in the target org: open deployment settings, click edit next to the source org. select allow inbound changes and save
Anonymous


mohamed abdo 9/1/2023 4:59:00 AM

very useful
Anonymous


Tom 3/18/2022 8:00:00 PM

i purchased this exam dumps from another website with way more questions but they were all invalid and outdate. this exam dumps was right to the point and all from recent exam. it was a hard pass.
UNITED KINGDOM


Edrick GOP 10/24/2023 6:00:00 AM

it was a good experience and i got 90% in the 200-901 exam.
Anonymous


anonymous 8/10/2023 2:28:00 AM

hi please upload this
Anonymous


Bakir 7/6/2023 7:24:00 AM

please upload it
UNITED KINGDOM


Aman 6/18/2023 1:27:00 PM

really need this dump. can you please help.
UNITED KINGDOM


Neela Para 1/8/2024 6:39:00 PM

really good and covers many areas explaining the answer.
NEW ZEALAND


Karan Patel 8/15/2023 12:51:00 AM

yes, can you please upload the exam?
UNITED STATES


NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES


DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous