SY0-701 Practice Test Questions

715 Questions


Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).


A. Channels by which the organization communicates with customers


B. The reporting mechanisms for ethics violations


C. Threat vectors based on the industry in which the organization operates


D. Secure software development training for all personnel


E. Cadence and duration of training events


F. Retraining requirements for individuals who fail phishing simulations





C.
  Threat vectors based on the industry in which the organization operates

E.
  Cadence and duration of training events

Explanation:
When formulating a training curriculum for a security awareness program, the most important factors to address are:

C. Threat vectors based on the industry:
Training should be tailored to the specific risks and threats relevant to the organization's industry (e.g., ransomware for healthcare, phishing for finance, insider threats for government). This ensures the content is practical and directly applicable, increasing engagement and effectiveness.

E. Cadence and duration of training events:
Regular, ongoing training (e.g., quarterly modules) with appropriate duration (short, focused sessions) helps reinforce knowledge, adapt to evolving threats, and avoid learner fatigue. One-time training is insufficient; a structured schedule ensures sustained awareness.

Why not the others?

A. Channels for customer communication:
While important for customer service, this is not a core security awareness topic for general employees.

B. Reporting mechanisms for ethics violations:
This is part of ethics or compliance training but is not the primary focus of security awareness (which targets threats like phishing or social engineering).

D. Secure software development training:
This is highly specialized for developers, not general personnel. Security awareness programs target all employees.

F. Retraining for phishing failures:
While retraining is important, it is a reactive component rather than a foundational curriculum planning factor. The core plan should prioritize proactive, industry-specific content and consistent scheduling.

Reference:
This aligns with Domain 5.0: Security Program Management and Oversight, specifically security awareness training. NIST SP 800-50 (Building an Information Technology Security Awareness and Training Program) emphasizes role-based, relevant content and continuous training to address evolving threats. Industry-specific threats ensure relevance, while cadence ensures retention.

Visitors to a secured facility are required to check in with a photo ID and enter the facility through an access control vestibule Which of the following but describes this form of security control?


A. Physical


B. Managerial


C. Technical


D. Operational





A.
  Physical

Explanation:
The security controls described—checking in with a photo ID and using an access control vestibule (such as a mantrap or turnstile)—are physical security controls. These controls are designed to protect physical assets, facilities, and personnel by restricting entry to authorized individuals through tangible barriers, verification processes, and surveillance mechanisms. The photo ID check validates identity, while the access control vestibule physically regulates entry, preventing unauthorized access or tailgating.

Analysis of Incorrect Options:

B. Managerial:
Managerial controls are administrative policies, procedures, or guidelines that govern security practices (e.g., security policies, risk assessments, training programs). While the rule requiring visitors to check in might be part of a managerial policy, the actual implementation (ID check, vestibule) is physical.

C. Technical:
Technical controls involve technology-based solutions like firewalls, encryption, access control lists, or authentication systems. The vestibule and ID check are physical, not software- or hardware-based in the IT sense (though the vestibule might incorporate technical elements like card readers, the primary function is physical restriction).

D. Operational:
Operational controls are day-to-day security practices executed by people (e.g., incident response, user access reviews). While the act of checking in is performed by personnel, the infrastructure (vestibule) and the process (ID verification) are fundamentally physical safeguards.

Reference:
This question aligns with Domain 1.0: General Security Concepts, which covers types of security controls. Physical controls are categorized as preventive (e.g., locks, fences) or detective (e.g., CCTV). The access control vestibule is a classic example of a physical preventive control, often used in high-security environments to enforce entry protocols.

A customer has a contract with a CSP and wants to identify which controls should be implemented in the IaaS enclave. Which of the following is most likely to contain this information?


A. Statement of work


B. Responsibility matrix


C. Service-level agreement


D. Master service agreement





B.
  Responsibility matrix

Explanation: A responsibility matrix clarifies the division of responsibilities between the cloud service provider (CSP) and the customer, ensuring that each party understands and implements their respective security controls.References: Security+ SY0-701 Course Content.

Which of the following must be considered when designing a high-availability network? (Select two).


A. Ease of recovery


B. Ability to patch


C. Physical isolation


D. Responsiveness


E. Attack surface


F. Extensible authentication





A.
  Ease of recovery

E.
  Attack surface

Explanation:
When designing a high-availability (HA) network, the primary goals are to ensure continuous operation and minimize downtime. Two critical considerations are:

A. Ease of recovery:
High-availability designs must include mechanisms for rapid recovery from failures (e.g., redundant components, failover systems, backup links). The easier and faster the recovery process, the lower the downtime, which is essential for maintaining availability.

E. Attack surface:
High-availability often involves redundant systems, load balancers, and complex configurations, which can expand the attack surface. If not properly secured, these additional components may introduce vulnerabilities. Reducing and hardening the attack surface is crucial to prevent compromises that could disrupt availability (e.g., DDoS attacks, exploits on redundant systems).

Why not the others?

B. Ability to patch:
While patching is important for security, it is not a core design principle specific to high-availability. HA focuses on redundancy and failover, not patch management.

C. Physical isolation:
This is more relevant to security (e.g., air-gapped networks) than high-availability. HA often relies on geographic distribution, not isolation.

D. Responsiveness:
This is a goal of HA (e.g., low latency) but not a design consideration—it is an outcome of proper HA design.

F. Extensible authentication:
This relates to identity and access management, not high-availability. HA is about resilience, not authentication methods.

Reference:
This aligns with Domain 3.0: Security Architecture, specifically network design principles for availability and resilience (e.g., NIST SP 800-53 SC-24). HA requires balancing redundancy with security to avoid introducing weaknesses.

A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?


A. Conduct an audit.


B. Initiate a penetration test.


C. Rescan the network.


D. Submit a report





C.
  Rescan the network.

Explanation:

C) Rescan the network is the correct next step.
After the operations team remediates the vulnerabilities identified in the initial assessment, the security practitioner should rescan the network to:

Verify that the remediation efforts were successful and the vulnerabilities are truly resolved.

Ensure no new vulnerabilities were introduced during the remediation process (e.g., due to configuration changes or patches).

Confirm the organization's risk posture has improved and meet compliance requirements.

This closure of the vulnerability management lifecycle (scan → remediate → rescan) is critical for validating security improvements.

Why the others are incorrect:

A) Conduct an audit:
Audits are broader examinations of policies, controls, and compliance. They are not the immediate next step after technical remediation of vulnerabilities.

B) Initiate a penetration test:
Penetration testing is an active assessment that exploits vulnerabilities to simulate real attacks. It is typically conducted independently or after vulnerability management cycles to test defenses, but it is not the direct follow-up to remediation.

D) Submit a report:
Reporting is done throughout the process (e.g., after the initial assessment and after verification). However, the immediate next step after remediation is to rescan for verification, which then feeds into final reporting.

Reference:
This question tests knowledge of Domain 4.3: Given an incident, utilize appropriate data sources to support an investigation and Domain 5.2: Explain elements of the risk management process. The vulnerability management lifecycle (identify, assess, remediate, verify) is a key practice, as emphasized in the SY0-701 objectives. Rescanning ensures remediation effectiveness and reduces residual risk.

A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?


A. Enumeration


B. Sanitization


C. Destruction


D. Inventory





B.
  Sanitization

Explanation:
Sanitization refers to the process of permanently removing data from storage devices to prevent its recovery. securely wiping hard drives (e.g., using tools like DBAN, secure erase, or cryptographic erasure) ensures that data cannot be retrieved when the decommissioned systems are sent to recycling. This aligns with the company's policy of rendering data unrecoverable before disposal.

Why not A?

Enumeration:
This involves listing or identifying items (e.g., network resources, users), not data removal.

Why not C?

Destruction:
Physical destruction (e.g., shredding, degaussing) is another method for data disposal, but the policy specifies "securely wiped," which is sanitization. Destruction is more extreme and typically used when devices cannot be reused.

Why not D?

Inventory:
This involves tracking assets, not data removal.

Reference:
Domain 2.7: "Explain the importance of data privacy and protection." The SY0-701 objectives cover data sanitization methods for ensuring data cannot be recovered from decommissioned devices, which is critical for compliance and preventing data breaches.

After an audit, an administrator discovers all users have access to confidential data on a file server. Which of the following should the administrator use to restrict access to the data quickly?


A. Group Policy


B. Content filtering


C. Data loss prevention


D. Access control lists





D.
  Access control lists

Explanation:
The scenario requires a quick method to restrict access to specific data on a file server. This is a direct problem of improperly configured file permissions.

D. Access control lists (ACLs) is correct.
ACLs are the native mechanism within a file system (like NTFS on Windows or POSIX on Linux) that explicitly defines which users or groups have what permissions (Read, Write, Execute) to files and folders. The administrator can directly modify the ACLs on the confidential data to remove inappropriate access and grant it only to authorized groups or users. This is the most direct and fastest way to resolve the issue.

A. Group Policy is incorrect.
Group Policy is a Windows feature used to centrally manage operating system, application, and user settings across a domain. While it can be used to deploy security settings and permissions, it is not the quickest or most direct tool for fixing permissions on a specific set of files on a single server. It's a broader, administrative tool for policy enforcement.

B. Content filtering is incorrect.
Content filtering is a network-level technology used to control the content that can be accessed or transmitted by users (e.g., blocking certain websites or file types). It is designed to prevent users from accessing unwanted external content or exfiltrating data, not to manage internal file permissions on a server.

C. Data loss prevention (DLP) is incorrect.
DLP is a suite of tools and processes designed to detect and prevent the unauthorized transmission of sensitive data. It is a broader, more complex solution that monitors data in use, in motion, and at rest. While it could eventually help enforce policies, it is not the tool an administrator would use to "quickly" change file-level permissions. Configuring DLP policies is a longer process.

Reference:
CompTIA Security+ SY0-701 Objective 3.7: "Given a scenario, implement identity and account management controls." Managing file system security through permissions and Access Control Lists (ACLs) is a fundamental skill covered under this objective for controlling data access.

An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?


A. Brand impersonation


B. Pretexting


C. Typosquatting


D. Phishing





D.
  Phishing

Explanation:
Phishing is a type of social engineering attack where attackers send fraudulent messages (often emails) that appear to come from a reputable source, such as a payment website. The goal is to trick recipients into revealing sensitive information (like login credentials) or installing malware. In this scenario, the email impersonated a payment website and lured the employee into entering login information on a fake site, which is a classic phishing attack.

Why the other options are incorrect:

A. Brand impersonation:
This is a technique used within phishing attacks where the attacker mimics a well-known brand (like a payment website) to gain trust. However, it is not the overarching attack type itself—it is a component of the phishing attempt.

B. Pretexting:
This involves creating a fabricated scenario (a pretext) to steal information. For example, an attacker might pose as an IT support technician asking for a password. While the email created a false scenario, the specific mechanism of using a fake website and link is hallmark phishing.

C. Typosquatting:
This is a technique where attackers register domain names similar to legitimate ones (e.g., "paypai.com" instead of "paypal.com") to catch users who make typos. While the malicious site in this attack might have used a typosquatted domain, the primary attack vector was the deceptive email, making "phishing" the broader and more accurate category.

Reference:
This question tests the ability to identify specific social engineering techniques.

This falls under Domain 1.1: Compare and contrast common social engineering techniques of the CompTIA Security+ SY0-701 exam objectives.

Phishing is a well-documented attack method in frameworks like NIST SP 800-63 and the OWASP Top 10, and it remains one of the most common threats organizations face. The scenario describes a typical credential harvesting phishing attack.

A company is decommissioning its physical servers and replacing them with an architecture that will reduce the number of individual operating systems. Which of the following strategies should the company use to achieve this security requirement?


A. Microservices


B. Containerization


C. Virtualization


D. Infrastructure as code





C.
  Virtualization

Explanation: To reduce the number of individual operating systems while decommissioning physical servers, the company should use containerization. Containerization allows multiple applications to run in isolated environments on a single operating system, significantly reducing the overhead compared to running multiple virtual machines, each with its own OS. Containerization: Uses containers to run multiple isolated applications on a single OS kernel, reducing the need for multiple OS instances and improving resource utilization. Microservices: An architectural style that structures an application as a collection of loosely coupled services, which does not necessarily reduce the number of operating systems. Virtualization: Allows multiple virtual machines to run on a single physical server, but each VM requires its own OS, not reducing the number of OS instances. Infrastructure as code: Manages and provisions computing infrastructure through machine-readable configuration files, but it does not directly impact the number of operating systems.

Which of the following describes the reason root cause analysis should be conducted as part of incident response?


A. To gather loCs for the investigation


B. To discover which systems have been affected


C. To eradicate any trace of malware on the network


D. To prevent future incidents of the same nature





D.
  To prevent future incidents of the same nature

Explanation:
The primary purpose of root cause analysis (RCA) in incident response is to identify the underlying, fundamental reason(s) an incident occurred. By understanding the root cause (e.g., a missing patch, misconfigured firewall, human error, or flawed process), organizations can implement corrective actions to address the weakness and prevent similar incidents from happening in the future. RCA transforms incident response from a reactive process into a proactive improvement cycle, enhancing overall security posture.

Analysis of Incorrect Options:

A. To gather IOCs for the investigation:
Indicators of Compromise (IOCs) are collected during the detection and analysis phases of incident response to identify malicious activity. RCA occurs later, focusing on why the incident happened, not just what happened.

B. To discover which systems have been affected:
Determining the scope of impact (affected systems) is part of the containment and analysis phases, not the goal of RCA. RCA digs deeper after the scope is known.

C. To eradicate any trace of malware on the network:
Eradication is a separate phase where threats are removed. RCA is a post-incident activity that follows eradication to learn from the event.

Reference:
This aligns with Domain 4.0: Security Operations, specifically the incident response lifecycle (NIST SP 800-61). RCA is a key step in the post-incident activity phase, aimed at continuous improvement. It is emphasized in frameworks like ISO/IEC 27035 (Incident Management) and best practices for turning incidents into lessons that strengthen defenses.

A new employee logs in to the email system for the first time and notices a message from human resources about onboarding. The employee hovers over a few of the links within the email and discovers that the links do not correspond to links associated with the company. Which of the following attack vectors is most likely being used?


A. Business email


B. Social engineering


C. Unsecured network


D. Default credentials





B.
  Social engineering

Explanation:
Social engineering is the broad term for psychological manipulation tactics used to deceive individuals into divulging confidential information or performing actions that compromise security. In this scenario, the attacker is impersonating human resources (a trusted entity) via email and using deceptive links (that do not lead to legitimate company sites) to trick the new employee. This is a classic social engineering attack, specifically a form of phishing.

Why the other options are incorrect:

A. Business email compromise (BEC):
This is a specific type of social engineering attack where attackers compromise legitimate business email accounts to conduct fraudulent activities (e.g., wire transfer fraud). While the email might appear to be from HR, the scenario does not indicate that a legitimate HR email account was compromised—only that the message is deceptive. The key indicator is the fraudulent links, which align more broadly with social engineering.

C. Unsecured network:
This refers to risks associated with using insecure Wi-Fi or networks where data can be intercepted. The attack is occurring via email content, not network eavesdropping.

D. Default credentials:
This involves attackers using unchanged default passwords to gain access to systems. The scenario focuses on deceptive email links, not credential exploitation.

Reference:
This question tests recognition of social engineering tactics, a core topic in security awareness.

This falls under Domain 1.1: Compare and contrast common social engineering techniques and Domain 5.2: Explain the importance of personnel security and security awareness training of the CompTIA Security+ SY0-701 exam objectives.

Training employees to verify email sources and hover over links to check URLs is a fundamental defense against social engineering, as emphasized in frameworks like NIST SP 800-50 (Building an Information Technology Security Awareness and Training Program).

Various stakeholders are meeting to discuss their hypothetical roles and responsibilities in a specific situation, such as a security incident or major disaster. Which of the following best describes this meeting?


A. Penetration test


B. Continuity of operations planning


C. Tabletop exercise


D. Simulation





C.
  Tabletop exercise

Explanation:
A tabletop exercise is a discussion-based session where stakeholders gather to review and discuss their roles, responsibilities, and actions in response to a hypothetical scenario, such as a security incident or disaster. Participants talk through the steps they would take, identify gaps in plans, and improve coordination without actually executing any actions. This low-pressure environment helps ensure everyone understands their part in a real emergency.

Analysis of Incorrect Options:

A. Penetration test:
This is a hands-on simulated attack on systems to identify vulnerabilities, not a discussion of roles and responsibilities.

B. Continuity of operations planning:
This involves developing strategies to maintain essential functions during a disruption. While related, it is a broader planning process, not the specific meeting described.

D. Simulation:
A simulation is a more immersive, practice-based exercise that may involve executing responses (e.g., activating backup systems). The scenario describes a discussion, not an active simulation.

Reference:
This falls under Domain 4.0: Security Operations, specifically incident response and disaster recovery preparedness. Tabletop exercises are recommended in frameworks like NIST SP 800-61 (Incident Handling Guide) and are a key part of validating and refining response plans.


Page 23 out of 60 Pages
Previous