CompTIA Security+ SY0-701 Exam Questions in PDF

Free CompTIA SY0-701 Dumps Questions (page: 8)

An analyst is performing a vulnerability scan against the web servers exposed to the internet without a system account. Which of the following is most likely being performed?

  1. Non-credentialed scan
  2. Packet capture
  3. Privilege escalation
  4. System enumeration
  5. Passive scan

Answer(s): A

Explanation:

Option A is correct because a non-credentialed (unauthenticated) vulnerability scan tests from an external perspective without system credentials, typical for internet-facing web servers. Incorrect — B: Packet capture is network traffic capture, not a vulnerability scan. Incorrect — C: Privilege escalation occurs after gaining access, not during external scanning. Incorrect — D: System enumeration involves gathering details from a host with credentials or local access. Incorrect — E: Passive scan is non-intrusive and may not identify active vulnerabilities; active non-credentialed scans are common for external systems.



A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior. Which of the following would be best for the administrator to reference?

  1. MITRE ATT&CK
  2. CSIRT
  3. CVSS
  4. SOAR

Answer(s): A

Explanation:

Option A is correct because MITRE ATT&CK provides a comprehensive, real-world knowledge base of adversary tactics, techniques, and procedures (TTPs) used in cyberattacks, enabling effective threat modeling and mitigations. Incorrect — B CSIRT: CSIRT is a team responsible for incident response and handling security incidents, not a knowledge base of adversary behavior. Incorrect — C CVSS: CVSS scores quantify vulnerability severity, not attacker techniques or behavior. Incorrect — D SOAR: SOAR is a platform for security orchestration, automation, and response, not a reference knowledge base of adversary behavior.



An architect has a request to increase the speed of data transfer using JSON requests externally. Currently, the organization uses SFTP to transfer data files. Which of the following will most likely meet the requirements?

  1. A website-hosted solution
  2. Cloud shared storage
  3. A secure email solution
  4. Microservices using API

Answer(s): D

Explanation:

Option D is correct because microservices using API enable programmatic, low-latency JSON-based data exchange over HTTP/HTTPS, increasing transfer speed and automation compared to file-based SFTP. A) A website-hosted solution may provide access but not inherently improve API-driven JSON transfer performance or security controls. B) Cloud shared storage is file/object-based and introduces additional transfer steps and latency; it’s not optimized for JSON API calls. C) A secure email solution is unsuitable for large data transfers and lacks structured API-based JSON mobility. INSUFFICIENT_KNOWLEDGE



Which of the following addresses individual rights such as the right to be informed, the right of access, and the right to be forgotten?

  1. GDPR
  2. PCI DSS
  3. NIST
  4. ISO

Answer(s): A

Explanation:

Option A is correct because GDPR (General Data Protection Regulation) governs individual privacy rights including the right to be informed, access, and erasure (right to be forgotten). Incorrect — B PCI DSS focuses on payment card security and does not address personal data rights. Incorrect — C NIST provides cybersecurity frameworks and best practices, not individual data-right guarantees. Incorrect — D ISO refers to various standards bodies (e.g., ISO/IEC 27001) but GDPR specifically enshrines these individual rights; ISO alone does not.



An administrator is installing an LDAP browser tool in order to view objects in the corporate LDAP directory. Secure connections to the LDAP server are required. When the browser connects to the server, certificate errors are being displayed, and then the connection is terminated. Which of the following is the most likely solution?

  1. The administrator should allow SAN certificates in the browser configuration.
  2. The administrator needs to install the server certificate into the local truststore.
  3. The administrator should request that the secure LDAP port be opened to the server.
  4. The administrator needs to increase the TLS version on the organization's RA.

Answer(s): B

Explanation:

Option B is correct because LDAP over TLS (LDAPS) requires the client to trust the server certificate. Installing the server certificate into the local truststore (root/CA) validates the server’s identity and prevents certificate errors that terminate the connection.
A) Incorrect — Allowing SAN certificates in the browser configuration is unrelated to trust of the server certificate; the issue is trust, not SAN handling.
C) Incorrect — Opening the secure LDAP port is unnecessary if trustchain validation fails; connection is terminated due to certificate trust, not port filtering.
D) Incorrect — Increasing the TLS version on RA (likely a CA/RA component) does not address the client’s certificate trust issue.



Which of the following is the most important security concern when using legacy systems to provide production service?

  1. Instability
  2. Lack of vendor support
  3. Loss of availability
  4. Use of insecure protocols

Answer(s): B

Explanation:

Option B is correct because lack of vendor support means no security patches, updates, or guidance for legacy systems, leaving unpatched vulnerabilities and increased risk exposure in production services.
A) Incorrect — instability may occur, but it’s not the principal security concern; systems can be updated or mitigated, whereas unsupported software lacks critical patches.
C) Incorrect — loss of availability is possible but stems from vulnerabilities; vendor support primarily addresses patching and defense.
D) Incorrect — insecure protocols are a risk, but the core issue with legacy systems is the end of vendor updates and security fixes, not just protocol choices.



A security investigation revealed that malicious software was installed on a server using a server administrator's credentials. During the investigation, the server administrator explained that Telnet was regularly used to log in.
Which of the following most likely occurred?

  1. A spraying attack was used to determine which credentials to use.
  2. A packet capture tool was used to steal the password.
  3. A remote-access Trojan was used to install the malware.
  4. A dictionary attack was used to log in as the server administrator.

Answer(s): B

Explanation:

Option B is correct because: A packet capture tool would enable an attacker to intercept credentials in transit if Telnet was used, since Telnet transmits in plaintext, allowing password capture during login and subsequent malware installation.
A) Incorrect — A spraying attack targets many accounts with a few credentials, not specifically tied to Telnet or credential theft during login.
C) Incorrect — A remote-access Trojan is a payload installed after access, not the method by which credentials were captured via Telnet.
D) Incorrect — A dictionary attack attempts to brute-force a password offline or online, not necessarily facilitated by captured in-flight credentials via Telnet.



A user is requesting Telnet access to manage a remote development web server. Insecure protocols are not allowed for use within any environment. Which of the following should be configured to allow remote access to this server?

  1. HTTPS
  2. SNMPv3
  3. SSH
  4. RDP
  5. SMTP

Answer(s): C

Explanation:

Option C is correct because SSH provides encrypted remote command-line access, replacing insecure Telnet for secure management of remote servers.
A) Incorrect — HTTPS is for web traffic encryption, not remote server management access by a shell.
B) Incorrect — SNMPv3 is for secure network device monitoring, not interactive remote server administration.
D) Incorrect — RDP is a remote desktop protocol; while it can provide remote access, it is less suited for secure command-line server management and introduces broader attack surface without explicit tunneling.
E) Incorrect — SMTP is for email delivery, not remote server administration.



Share your comments for CompTIA SY0-701 exam with other users:

P
Paul
10/21/2023 8:25:00 AM

i think it is good question

U
Unknown
8/15/2023 5:09:00 AM

good for students who wish to give certification.

C
Ch
11/20/2023 10:56:00 PM

is there a google drive link to the images? the links in questions are not working.

J
Joey
5/16/2023 5:25:00 AM

very promising, looks great, so much wow!

A
alaska
10/24/2023 5:48:00 AM

i scored 87% on the az-204 exam. thanks! i always trust

N
nnn
7/9/2023 11:09:00 PM

good need more

U
User-sfdc
12/29/2023 7:21:00 AM

sample questions seems good

T
Tamer dam
8/4/2023 10:21:00 AM

huawei is ok

Y
YK
12/11/2023 1:10:00 AM

good one nice

D
de
8/28/2023 2:38:00 AM

please continue

D
DMZ
6/25/2023 11:56:00 PM

this exam dumps just did the job. i donot want to ruffle your feathers but your exam dumps and mock test engine is amazing.

J
Jose
8/30/2023 6:14:00 AM

nice questions

T
Tar01
7/24/2023 7:07:00 PM

the explanation are really helpful

D
DaveG
12/15/2023 4:50:00 PM

just passed my exam yesterday on my first attempt. these dumps were extremely helpful in passing first time. the questions were very, very similar to these questions!

A
A.K.
6/30/2023 6:34:00 AM

cosmos db is paas not saas

S
S Roychowdhury
6/26/2023 5:27:00 PM

what is the percentage of common questions in gcp exam compared to 197 dump questions? are they 100% matching with real gcp exam?

B
Bella
7/22/2023 2:05:00 AM

not able to see questions

S
Scott
9/8/2023 7:19:00 AM

by far one of the best sites for free questions. i have pass 2 exams with the help of this website.

D
donald
8/19/2023 11:05:00 AM

excellent question bank.

A
Ashwini
8/22/2023 5:13:00 AM

it really helped

S
sk
5/13/2023 2:07:00 AM

excelent material

C
Christopher
9/5/2022 10:54:00 PM

the new versoin of this exam which i downloaded has all the latest questions from the exam. i only saw 3 new questions in the exam which was not in this dump.

S
Sam
9/7/2023 6:51:00 AM

question 8 - can cloudtrail be used for storing jobs? based on aws - aws cloudtrail is used for governance, compliance and investigating api usage across all of our aws accounts. every action that is taken by a user or script is an api call so this is logged to [aws] cloudtrail. something seems incorrect here.

T
Tanvi Rajput
8/14/2023 10:55:00 AM

question 13 tda - c01 answer : quick table calculation -> percentage of total , compute using table down

P
PMSAGAR
9/19/2023 2:48:00 AM

pls share teh dump

Z
zazza
6/16/2023 10:47:00 AM

question 44 answer is user risk

P
Prasana
6/23/2023 1:59:00 AM

please post the questions for preparation

T
test user
9/24/2023 3:15:00 AM

thanks for the questions

D
Draco
7/19/2023 5:34:00 AM

please reopen it now ..its really urgent

M
Megan
4/14/2023 5:08:00 PM

these practice exam questions were exactly what i needed. the variety of questions and the realistic exam-like environment they created helped me assess my strengths and weaknesses. i felt more confident and well-prepared on exam day, and i owe it to this exam dumps!

A
abdo casa
8/9/2023 6:10:00 PM

thank u it very instructuf

D
Danny
1/15/2024 9:10:00 AM

its helpful?

H
hanaa
10/3/2023 6:57:00 PM

is this dump still valid???

G
Georgio
1/19/2024 8:15:00 AM

question 205 answer is b

AI Tutor 👋 I’m here to help!