SY0-701 Practice Test Questions

389 Questions


A security analyst is investigating an alert that was produced by endpoint protection software. The analyst determines this event was a false positive triggered by an employee who attempted to download a file. Which of the following is the most likely reason the download was blocked?


A. A misconfiguration in the endpoint protection software


B. A zero-day vulnerability in the file


C. A supply chain attack on the endpoint protection vendor


D. Incorrect file permissions





A.
  A misconfiguration in the endpoint protection software

Explanation: The most likely reason the download was blocked, resulting in a false positive, is a misconfiguration in the endpoint protection software. False positives occur when legitimate actions are incorrectly identified as threats due to incorrect settings or overly aggressive rules in the security software.
Misconfiguration in the endpoint protection software: Common cause of false positives, where legitimate activities are flagged incorrectly due to improper settings.
Zero-day vulnerability: Refers to previously unknown vulnerabilities, which are less likely to be associated with a false positive.
Supply chain attack: Involves compromising the software supply chain, which is a broader and more severe issue than a simple download being blocked.
Incorrect file permissions: Would prevent access to files but not typically cause an alert in endpoint protection software.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 4.3 - Explain various activities associated with vulnerability management (False positives).

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:
“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”
Which of the following are the best responses to this situation? (Choose two).


A. Cancel current employee recognition gift cards.


B. Add a smishing exercise to the annual company training.


C. Issue a general email warning to the company.


D. Have the CEO change phone numbers.


E. Conduct a forensic investigation on the CEO's phone.


F. Implement mobile device management.





B.
  Add a smishing exercise to the annual company training.

C.
  Issue a general email warning to the company.

Explanation: This situation is an example of smishing, which is a type of phishing that uses text messages (SMS) to entice individuals into providing personal or sensitive information to cybercriminals. The best responses to this situation are to add a smishing exercise to the annual company training and to issue a general email warning to the company. A smishing exercise can help raise awareness and educate employees on how to recognize and avoid smishing attacks. An email warning can alert employees to the fraudulent text message and remind them to verify the identity and legitimacy of any requests for information or money. References = What Is Phishing | Cybersecurity | CompTIA, Phishing – SY0-601 CompTIA Security+ : 1.1 - Professor Messer IT Certification Training Courses

A website user is locked out of an account after clicking an email link and visiting a different website Web server logs show the user's password was changed, even though the user did not change the password. Which of the following is the most likely cause?


A. Cross-sue request forgery


B. Directory traversal


C. ARP poisoning


D. SQL injection





A.
  Cross-sue request forgery

Explanation: The scenario describes a situation where a user unknowingly triggers an unwanted action, such as changing their password, by clicking a malicious link. This is indicative of a Cross-Site Request Forgery (CSRF) attack, where an attacker tricks the user into executing actions they did not intend to perform on a web application in which they are authenticated. References = CompTIA Security+ SY0-701 study materials, particularly in the domain of web application security and common attack vectors like CSRF.

Sine© a recent upgrade (o a WLAN infrastructure, several mobile users have been unable to access the internet from the lobby. The networking team performs a heat map survey of the building and finds several WAPs in the area. The WAPs are using similar frequencies with high power settings. Which of the following installation considerations should the security team evaluate next?


A. Channel overlap


B. Encryption type


C. New WLAN deployment


D. WAP placement





A.
  Channel overlap

Explanation: When multiple Wireless Access Points (WAPs) are using similar frequencies with high power settings, it can cause channel overlap, leading to interference and connectivity issues. This is likely the reason why mobile users are unable to access the internet in the lobby. Evaluating and adjusting the channel settings on the WAPs to avoid overlap is crucial to resolving the connectivity problems.
References = CompTIA Security+ SY0-701 study materials, particularly the domain on Wireless and Mobile Security, which covers WLAN deployment considerations.

A company most likely is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will be classified? (Select two).


A. Private


B. Confidential


C. Public


D. Operational


E. Urgent


F. Restricted





B.
  Confidential

F.
  Restricted

Explanation: When a company is developing a critical system for the government and storing project information on a fileshare, the data will most likely be classified as Confidential and Restricted.
Confidential: Indicates that the data is sensitive and access is limited to authorized individuals. This classification is typically used for information that could cause harm if disclosed.
Restricted: Indicates that access to the data is highly controlled and limited to those with a specific need to know. This classification is often used for highly sensitive information that requires stringent protection measures. Private: Generally refers to personal information that is not meant to be publicly accessible.
Public: Information that is intended for public access and does not require protection. Operational: Relates to day-to-day operations, but not necessarily to data classification. Urgent: Refers to the priority of action rather than data classification.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 5.1 - Security program management and oversight (Data classification).

A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?


A. Application


B. IPS/IDS


C. Network


D. Endpoint





D.
  Endpoint

Explanation: An endpoint log is a file that contains information about the activities and events that occur on an end-user device, such as a laptop, desktop, tablet, or smartphone. Endpoint logs can provide valuable data for security analysts, such as the processes running on the device, the network connections established, the files accessed or modified, the user actions performed, and the applications installed or updated. Endpoint logs can also record the details of any executable files running on the device, such as the name, path, size, hash, signature, and permissions of the executable.
An application log is a file that contains information about the events that occur within a software application, such as errors, warnings, transactions, or performance metrics.
Application logs can help developers and administrators troubleshoot issues, optimize performance, and monitor user behavior. However, application logs may not provide enough information about the executable files running on the device, especially if they are malicious or unknown.
An IPS/IDS log is a file that contains information about the network traffic that is monitored and analyzed by an intrusion prevention system (IPS) or an intrusion detection system (IDS). IPS/IDS logs can help security analysts identify and block potential attacks, such as exploit attempts, denial-of-service (DoS) attacks, or malicious scans. However, IPS/IDS logs may not provide enough information about the executable files running on the device, especially if they are encrypted, obfuscated, or use legitimate protocols.
A network log is a file that contains information about the network activity and communication that occurs between devices, such as IP addresses, ports, protocols, packets, or bytes. Network logs can help security analysts understand the network topology, traffic patterns, and bandwidth usage. However, network logs may not provide enough information about the executable files running on the device, especially if they are hidden, spoofed, or use proxy servers.
Therefore, the best log type to use as a data source for additional information about the executable running on the machine is the endpoint log, as it can provide the most relevant and detailed data about the executable file and its behavior.

A security analyst developed a script to automate a trivial and repeatable task. Which of the following best describes the benefits of ensuring other team members understand how the script works?


A. To reduce implementation cost


B. To identify complexity


C. To remediate technical debt


D. To prevent a single point of failure





D.
  To prevent a single point of failure

Explanation: Ensuring that other team members understand how a script works is essential to prevent a single point of failure. If only one person knows how the script operates, the organization risks being unable to maintain or troubleshoot it if that person is unavailable. Sharing knowledge ensures continuity and reduces dependence on one individual.
Reducing implementation cost and remediating technical debt are secondary considerations in this context. Identifying complexity is important, but the main benefit is to avoid a single point of failure.

Which of the following is die most important security concern when using legacy systems to provide production service?


A. Instability


B. Lack of vendor support


C. Loss of availability


D. Use of insecure protocols





B.
  Lack of vendor support

Explanation: The most important security concern when using legacy systems is the lack of vendor support. Without support from the vendor, systems may not receive critical security patches and updates, leaving them vulnerable to exploitation. This lack of support can result in increased risk of security breaches, as vulnerabilities discovered in the software may never be addressed.
References = CompTIA Security+ SY0-701 study materials, particularly in the context of risk management and the challenges posed by legacy systems.

Two companies are in the process of merging. The companies need to decide how to standardize their information security programs. Which of the following would best align the security programs?


A. Shared deployment of CIS baselines


B. Joint cybersecurity best practices


C. Both companies following the same CSF


D. Assessment of controls in a vulnerability report





C.
  Both companies following the same CSF

Explanation: A Cybersecurity Framework (CSF) provides a structured approach to standardizing and aligning security programs across different organizations. By both companies adopting the same CSF, they can ensure that their security measures, policies, and practices are consistent, which is essential during a merger when aligning two different security programs. References = CompTIA Security+ SY0-701 Course Content: The course discusses the importance of adopting standardized cybersecurity frameworks (CSF) for aligning security programs during mergers and acquisitions.

Which of the following tasks is typically included in the BIA process?


A. Estimating the recovery time of systems


B. Identifying the communication strategy


C. Evaluating the risk management plan


D. Establishing the backup and recovery procedures


E. Developing the incident response plan





A.
  Estimating the recovery time of systems

Explanation: Estimating the recovery time of systems is a task typically included in the Business Impact Analysis (BIA) process. BIA involves identifying the critical functions of a business and determining the impact of a disruption. This includes estimating how long it will take to recover systems and resume normal operations.
Estimating the recovery time of systems: A key component of BIA, which helps in understanding the time needed to restore systems and services after a disruption. Identifying the communication strategy: Typically part of the incident response plan, not BIA.
Evaluating the risk management plan: Part of risk management, not specifically BIA. Establishing the backup and recovery procedures: Important for disaster recovery, not directly part of BIA.
Developing the incident response plan: Focuses on responding to security incidents, not on the impact analysis.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 5.2 - Risk management process (Business Impact Analysis - BIA).

A bank set up a new server that contains customers' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?


A. Full disk encryption


B. Network access control


C. File integrity monitoring


D. User behavior analytics





C.
  File integrity monitoring

Explanation: To ensure that sensitive data, such as Personally Identifiable Information (PII), is not modified, the bank should implement file integrity monitoring (FIM). FIM tracks changes to files and provides alerts if unauthorized modifications are detected, ensuring data integrity. Full disk encryption protects data at rest but does not prevent or monitor modifications. Network access control (NAC) manages access to the network but doesn't monitor file changes. User behavior analytics (UBA) detects suspicious user activities but is not focused on file integrity.

A company is currently utilizing usernames and passwords, and it wants to integrate an MFA method that is seamless, can Integrate easily into a user's workflow, and can utilize employee-owned devices. Which of the following will meet these requirements?


A. Push notifications


B. Phone call


C. Smart card


D. Offline backup codes





A.
  Push notifications

Explanation: Push notifications offer a seamless and user-friendly method of multi-factor authentication (MFA) that can easily integrate into a user’s workflow. This method leverages employee-owned devices, like smartphones, to approve authentication requests through a push notification. It's convenient, quick, and doesn't require the user to input additional codes, making it a preferred choice for seamless integration with existing workflows. References = CompTIA Security+ SY0-701 Course Content: Domain 04 Security Operations. CompTIA Security+ SY0-601 Study Guide: Chapter on Identity and Access Management.


Page 9 out of 33 Pages
Previous