An analyst is performing a vulnerability scan against the web servers exposed to the internet without a system account. Which of the following is most likely being performed?
Answer(s): A
Option A is correct because a non-credentialed (unauthenticated) vulnerability scan tests from an external perspective without system credentials, typical for internet-facing web servers. Incorrect — B: Packet capture is network traffic capture, not a vulnerability scan. Incorrect — C: Privilege escalation occurs after gaining access, not during external scanning. Incorrect — D: System enumeration involves gathering details from a host with credentials or local access. Incorrect — E: Passive scan is non-intrusive and may not identify active vulnerabilities; active non-credentialed scans are common for external systems.
A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior. Which of the following would be best for the administrator to reference?
Option A is correct because MITRE ATT&CK provides a comprehensive, real-world knowledge base of adversary tactics, techniques, and procedures (TTPs) used in cyberattacks, enabling effective threat modeling and mitigations. Incorrect — B CSIRT: CSIRT is a team responsible for incident response and handling security incidents, not a knowledge base of adversary behavior. Incorrect — C CVSS: CVSS scores quantify vulnerability severity, not attacker techniques or behavior. Incorrect — D SOAR: SOAR is a platform for security orchestration, automation, and response, not a reference knowledge base of adversary behavior.
An architect has a request to increase the speed of data transfer using JSON requests externally. Currently, the organization uses SFTP to transfer data files. Which of the following will most likely meet the requirements?
Answer(s): D
Option D is correct because microservices using API enable programmatic, low-latency JSON-based data exchange over HTTP/HTTPS, increasing transfer speed and automation compared to file-based SFTP. A) A website-hosted solution may provide access but not inherently improve API-driven JSON transfer performance or security controls. B) Cloud shared storage is file/object-based and introduces additional transfer steps and latency; it’s not optimized for JSON API calls. C) A secure email solution is unsuitable for large data transfers and lacks structured API-based JSON mobility. INSUFFICIENT_KNOWLEDGE
Which of the following addresses individual rights such as the right to be informed, the right of access, and the right to be forgotten?
Option A is correct because GDPR (General Data Protection Regulation) governs individual privacy rights including the right to be informed, access, and erasure (right to be forgotten). Incorrect — B PCI DSS focuses on payment card security and does not address personal data rights. Incorrect — C NIST provides cybersecurity frameworks and best practices, not individual data-right guarantees. Incorrect — D ISO refers to various standards bodies (e.g., ISO/IEC 27001) but GDPR specifically enshrines these individual rights; ISO alone does not.
An administrator is installing an LDAP browser tool in order to view objects in the corporate LDAP directory. Secure connections to the LDAP server are required. When the browser connects to the server, certificate errors are being displayed, and then the connection is terminated. Which of the following is the most likely solution?
Answer(s): B
Option B is correct because LDAP over TLS (LDAPS) requires the client to trust the server certificate. Installing the server certificate into the local truststore (root/CA) validates the server’s identity and prevents certificate errors that terminate the connection.A) Incorrect — Allowing SAN certificates in the browser configuration is unrelated to trust of the server certificate; the issue is trust, not SAN handling.C) Incorrect — Opening the secure LDAP port is unnecessary if trustchain validation fails; connection is terminated due to certificate trust, not port filtering.D) Incorrect — Increasing the TLS version on RA (likely a CA/RA component) does not address the client’s certificate trust issue.
Which of the following is the most important security concern when using legacy systems to provide production service?
Option B is correct because lack of vendor support means no security patches, updates, or guidance for legacy systems, leaving unpatched vulnerabilities and increased risk exposure in production services. A) Incorrect — instability may occur, but it’s not the principal security concern; systems can be updated or mitigated, whereas unsupported software lacks critical patches. C) Incorrect — loss of availability is possible but stems from vulnerabilities; vendor support primarily addresses patching and defense. D) Incorrect — insecure protocols are a risk, but the core issue with legacy systems is the end of vendor updates and security fixes, not just protocol choices.
A security investigation revealed that malicious software was installed on a server using a server administrator's credentials. During the investigation, the server administrator explained that Telnet was regularly used to log in.Which of the following most likely occurred?
Option B is correct because: A packet capture tool would enable an attacker to intercept credentials in transit if Telnet was used, since Telnet transmits in plaintext, allowing password capture during login and subsequent malware installation.A) Incorrect — A spraying attack targets many accounts with a few credentials, not specifically tied to Telnet or credential theft during login.C) Incorrect — A remote-access Trojan is a payload installed after access, not the method by which credentials were captured via Telnet.D) Incorrect — A dictionary attack attempts to brute-force a password offline or online, not necessarily facilitated by captured in-flight credentials via Telnet.
A user is requesting Telnet access to manage a remote development web server. Insecure protocols are not allowed for use within any environment. Which of the following should be configured to allow remote access to this server?
Answer(s): C
Option C is correct because SSH provides encrypted remote command-line access, replacing insecure Telnet for secure management of remote servers.A) Incorrect — HTTPS is for web traffic encryption, not remote server management access by a shell. B) Incorrect — SNMPv3 is for secure network device monitoring, not interactive remote server administration. D) Incorrect — RDP is a remote desktop protocol; while it can provide remote access, it is less suited for secure command-line server management and introduces broader attack surface without explicit tunneling. E) Incorrect — SMTP is for email delivery, not remote server administration.
Share your comments for CompTIA SY0-701 exam with other users:
i think it is good question
good for students who wish to give certification.
is there a google drive link to the images? the links in questions are not working.
very promising, looks great, so much wow!
i scored 87% on the az-204 exam. thanks! i always trust
good need more
sample questions seems good
huawei is ok
good one nice
please continue
this exam dumps just did the job. i donot want to ruffle your feathers but your exam dumps and mock test engine is amazing.
nice questions
the explanation are really helpful
just passed my exam yesterday on my first attempt. these dumps were extremely helpful in passing first time. the questions were very, very similar to these questions!
cosmos db is paas not saas
what is the percentage of common questions in gcp exam compared to 197 dump questions? are they 100% matching with real gcp exam?
not able to see questions
by far one of the best sites for free questions. i have pass 2 exams with the help of this website.
excellent question bank.
it really helped
excelent material
the new versoin of this exam which i downloaded has all the latest questions from the exam. i only saw 3 new questions in the exam which was not in this dump.
question 8 - can cloudtrail be used for storing jobs? based on aws - aws cloudtrail is used for governance, compliance and investigating api usage across all of our aws accounts. every action that is taken by a user or script is an api call so this is logged to [aws] cloudtrail. something seems incorrect here.
question 13 tda - c01 answer : quick table calculation -> percentage of total , compute using table down
pls share teh dump
question 44 answer is user risk
please post the questions for preparation
thanks for the questions
please reopen it now ..its really urgent
these practice exam questions were exactly what i needed. the variety of questions and the realistic exam-like environment they created helped me assess my strengths and weaknesses. i felt more confident and well-prepared on exam day, and i owe it to this exam dumps!
thank u it very instructuf
its helpful?
is this dump still valid???
question 205 answer is b