CompTIA SY0-701 Exam (page: 8)
CompTIA Security+
Updated on: 15-Feb-2026

Viewing Page 8 of 91

An analyst is performing a vulnerability scan against the web servers exposed to the internet without a system account.
Which of the following is most likely being performed?

  1. Non-credentialed scan
  2. Packet capture
  3. Privilege escalation
  4. System enumeration
  5. Passive scan

Answer(s): A


Reference:



A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior.
Which of the following would be best for the administrator to reference?

  1. MITRE ATT&CK
  2. CSIRT
  3. CVSS
  4. SOAR

Answer(s): A


Reference:



An architect has a request to increase the speed of data transfer using JSON requests externally. Currently, the organization uses SFTP to transfer data files.
Which of the following will most likely meet the requirements?

  1. A website-hosted solution
  2. Cloud shared storage
  3. A secure email solution
  4. Microservices using API

Answer(s): D



Which of the following addresses individual rights such as the right to be informed, the right of access, and the right to be forgotten?

  1. GDPR
  2. PCI DSS
  3. NIST
  4. ISO

Answer(s): A


Reference:



An administrator is installing an LDAP browser tool in order to view objects in the corporate LDAP directory. Secure connections to the LDAP server are required.
When the browser connects to the server, certificate errors are being displayed, and then the connection is terminated.
Which of the following is the most likely solution?

  1. The administrator should allow SAN certificates in the browser configuration.
  2. The administrator needs to install the server certificate into the local truststore.
  3. The administrator should request that the secure LDAP port be opened to the server.
  4. The administrator needs to increase the TLS version on the organization's RA.

Answer(s): B



Which of the following is the most important security concern when using legacy systems to provide production service?

  1. Instability
  2. Lack of vendor support
  3. Loss of availability
  4. Use of insecure protocols

Answer(s): B


Reference:



A security investigation revealed that malicious software was installed on a server using a server administrator's credentials. During the investigation, the server administrator explained that Telnet was regularly used to log in.
Which of the following most likely occurred?

  1. A spraying attack was used to determine which credentials to use.
  2. A packet capture tool was used to steal the password.
  3. A remote-access Trojan was used to install the malware.
  4. A dictionary attack was used to log in as the server administrator.

Answer(s): B



A user is requesting Telnet access to manage a remote development web server. Insecure protocols are not allowed for use within any environment.
Which of the following should be configured to allow remote access to this server?

  1. HTTPS
  2. SNMPv3
  3. SSH
  4. RDP
  5. SMTP

Answer(s): C


Reference:



Viewing Page 8 of 91



Share your comments for CompTIA SY0-701 exam with other users:

unanimous 12/15/2023 6:38:00 AM

very nice very nice
Anonymous


akminocha 9/28/2023 10:36:00 AM

please help us with 1z0-1107-2 dumps
INDIA


Jefi 9/4/2023 8:15:00 AM

please upload the practice questions
Anonymous


Thembelani 5/30/2023 2:45:00 AM

need this dumps
Anonymous


Abduraimov 4/19/2023 12:43:00 AM

preparing for this exam is overwhelming. you cannot pass without the help of these exam dumps.
UNITED KINGDOM


Puneeth 10/5/2023 2:06:00 AM

new to this site but i feel it is good
EUROPEAN UNION


Ashok Kumar 1/2/2024 6:53:00 AM

the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Anonymous


Merry 7/30/2023 6:57:00 AM

good questions
Anonymous


VoiceofMidnight 12/17/2023 4:07:00 PM

Delayed the exam until December 29th.
UNITED STATES


Umar Ali 8/29/2023 2:59:00 PM

A and D are True
Anonymous


vel 8/28/2023 9:17:09 AM

good one with explanation
Anonymous


Gurdeep 1/18/2024 4:00:15 PM

This is one of the most useful study guides I have ever used.
CANADA