Scroll down to see your responses and detailed results
Prepare for the CompTIA Security+ SY0-701 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
There are multiple different access control schemes that can be implemented within an organization. Which type of scheme restricts access based on sensitivity levels and is typically associated with the military?
ABAC
RuBAC
RBAC
MAC
DAC
Mandatory access control (MAC) is a type of access control scheme that labels information/systems with a sensitivity (clearance) level and access is only granted if the individual has a clearance level equal to or greater than that level.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
A multinational corporation is looking to streamline its network infrastructure by integrating both its networking and security services into a single, cloud-based solution that supports dynamic and secure access for their distributed workforce. Which solution aligns BEST with these requirements?
An integrated platform designed to simplify security management by providing a suite of security features through a single appliance
A service primarily focused on inspecting inbound and outbound web traffic to protect against web threats at application level
An advanced networking security device offering enhanced inspection capabilities that go beyond traditional stateful inspection
A global cloud-native service that combines networking and security functions to deliver secure, policy-based access to company resources for any user, anywhere
The solution that best aligns with the requirement of integrating network and security services within a cloud-based model for a distributed workforce is characterized by its ability to converge wide area networking capabilities and network security functions. This model should be delivered as a service, focusing on providing secure and efficient access irrespective of user location. While solutions aimed at protecting web applications, unifying threat management, and offering advanced firewall features could all enhance security in certain aspects, they do not offer the holistic, identity-centric, cloud-native convergence of networking and security required by the corporation's distributed nature. The correct solution employs a global cloud-native architecture and delivers a seamless service that extends consistent secure access across the organization.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does MTBF stand for, and what does it indicate regarding a system's reliability?
Maximum Time Before Failure, indicating the longest time a system can function before it fails
Minimum Time Before Failure, reflecting the shortest time a system might operate before encountering an issue
Mean Time Between Failures, measuring the average time operational between system breakdowns
Mean Time Before Fix, representing the average time to repair a system after a failure
MTBF stands for Mean Time Between Failures. It is a reliability metric that predicts the average time between system breakdowns or failures. A higher MTBF indicates a more reliable system that is likely to operate longer without issues, which is pivotal for business continuity and planning. It is calculated based on historical data and includes only operational periods between failures, not the time required for repair or maintenance.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
The software section of the security team has been asked to review the source code for a program being developed. They are being asked to look for any coding errors or possible security vulnerabilities. This is what type of application security review?
Fuzzing
Secure coding
Static code analysis
Dynamic code analysis
Static code analysis is the analysis of software code without executing the software. Reviewing the lines of a program’s/software’s source code is a type of static code analysis. Dynamic code analysis is performed while it is being executed.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Changing the default port of a secure service to a non-standard port is considered a sufficient security control to prevent unauthorized access
True
False
The statement is false because while changing the default port can reduce the surface visibility to automated attacks or scans, it is considered security by obscurity, which is not sufficient as a standalone security measure. Attackers can still discover services on non-standard ports using port scanning techniques. Proper security controls require the implementation of additional measures such as firewalls, intrusion prevention systems, and stringent access controls.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Backup systems are implemented to restore data and system functionality after data loss or corruption occurs.
False
True
The correct answer is that this statement is true. Backup systems are a type of corrective control designed to restore systems and data to their appropriate state following an incident, such as data loss or corruption. They are essential for business continuity and disaster recovery strategies.
Incorrect answers can easily mislead as they may reference related concepts, such as redundant systems or preventive controls, which serve different purposes. Redundant systems are intended for immediate failover to avoid downtime, while preventive controls are designed to stop incidents from occurring in the first place.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Which of the following best describes the primary purpose of a security policy?
To define access control lists for network resources
To detail specific incident response procedures
To provide a high-level framework for an organization's approach to security
To specify encryption standards for data at rest and in transit
A security policy is a high-level document that outlines an organization's approach to protecting its assets, including data, systems, and personnel. It establishes the framework for security controls and procedures, defining roles, responsibilities, and expected behavior. While security policies may include specific guidelines and procedures, their primary purpose is to provide overarching guidance and direction for the organization's security posture. Incident response plans, access control lists, and encryption standards are examples of more specific security controls that are typically guided by the security policy but are not the primary purpose of the policy itself.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Your organization is experiencing rapid growth and expects a significant increase in online transaction volume over the next year. As a security professional assessing the infrastructure to accommodate future demands, which of the following would be the BEST measure to ensure the infrastructure can scale securely and effectively?
Vertically scale the existing infrastructure by upgrading the current server to a model with more processing power and memory.
Consolidate all data storage into a single geographic region to reduce complexity and ensure all users access the same resources.
Plan for horizontal scaling by adding additional servers or utilizing cloud-based resources to distribute the load evenly across multiple hardware platforms.
Invest in a more powerful server to replace the current one, ensuring that the new hardware can handle the anticipated load for the next year.
Implementing scalability in the infrastructure planning ensures that the system can handle growth in user demand without performance degradation or security compromise. Vertical scaling might offer an immediate increase in resources but often leads to downtime during upgrades and has limitations on how much can be scaled up. On the other hand, selecting a more powerful server might provide temporary relief but doesn't provide a long-term scalable solution. Using a single geographic region for data storage may reduce complexity but doesn't consider the increased load that comes with growth. Horizontal scaling, which involves adding more servers or using cloud resources, offers flexibility, improved fault tolerance, and seamless scalability, making it the most effective option for sustained growth.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
An organization is reviewing their incident response plan in light of new threats detailed in a recent security bulletin. When prioritizing actions, which of the following is the BEST immediate step for the organization to take to prevent a breach?
Immediately revise their incident response plan to include the new threats.
Update the organization's security documentation to reflect the newly identified threats.
Monitor network traffic for indicators of compromise associated with the published threats.
Assess and apply necessary patches or updates for documented vulnerabilities.
When responding to new threats identified in security bulletins, it's crucial to first assess and apply appropriate patches or updates provided for known vulnerabilities. While monitoring for indicators of compromise is important, it does not prevent an attack, and updating documentation or revising response plans can be performed subsequently.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Which type of security control is primarily intended to discourage a potential attacker from attempting to breach your security perimeter?
Directive
Corrective
Deterrent
Detective
Compensating
Preventive
A deterrent control is designed to discourage potential attackers from attempting a security breach, making it the correct answer. Deterrent controls include things like warning signs or false/visible security measures that increase the perceived risk for attackers.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
During a routine security audit, the auditor discovers that two different archived log files generate the same hash value despite having different contents. Which of the following type of attack might have occurred?
Collision attack
Key exchange method
Hashing algorithm speed
Password entropy
This situation is indicative of a collision attack in which two different data sets produce the same hash value. Collision attacks exploit weaknesses in hashing algorithms to create such scenarios. The correct answer is not 'Hashing algorithm speed' as this refers to how quickly a hashing algorithm can process data and is not directly related to the uniqueness of hash outputs. 'Password entropy' is irrelevant because it pertains to the complexity and unpredictability of passwords. 'Key exchange method' is also incorrect because this refers to how cryptographic keys are exchanged between parties, not the uniqueness of hash function outputs.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Which component is built into a computing device to provide secure generation, storage, and use of cryptographic keys?
Hardware Security Module
Trusted Platform Module
Biometric Sensor
Secure Boot
The component designed to be integrated into a computing device for securing cryptographic keys is the Trusted Platform Module. It provides hardware-based security by managing keys within a protected environment, isolated from the operating system. A Hardware Security Module is a dedicated external device used for managing keys, not typically integrated directly on a computer's motherboard. Biometric sensors and secure boot are unrelated to the secure storage and handling of cryptographic keys. Biometric sensors are used for authentication purposes, while secure boot is a process ensuring the integrity of the operating system's boot process.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
A company's security monitoring tools have flagged an escalating trend in unauthorized attempts targeting employee accounts on the corporate portal. Which countermeasure should be considered first by the security analyst to counteract this activity?
Implement a lockout policy.
Increase the logging level of the portal access logs.
Conduct a comprehensive network vulnerability scan.
Renew all SSL certificates used by the company.
The escalation in unauthorized account access attempts is indicative of a potential brute force attack. The most direct method to mitigate this type of attack is to implement an account lockout policy, which would temporarily block accounts after a certain number of failed login attempts, helping to prevent unauthorized access. Increasing the logging level would only increase the detail of the incident records but not prevent the attempts. Performing a network scan may identify vulnerabilities but would not address the ongoing access attempts. Renewing SSL certificates is a regular maintenance task and would not prevent account brute force attempts.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What type of risk assessment is conducted as needed, often in response to specific events or changes in the environment?
Ad Hoc
Qualitative
Continuous
Recurring
An 'Ad Hoc' risk assessment is performed as required, without a regular schedule, often in response to significant changes or new threats to an organization's environment. It contrasts with recurring or continuous assessments that happen at regular intervals or constantly, respectively. A 'Qualitative' risk assessment refers to the process that prioritizes risks based on their severity and impact, rather than their frequency or timing.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
During disposal of storage media, due to regulatory requirements some of the data is required to be saved for a certain period of time. This is an example of what?
Destruction
Certification
Sanitization
Data retention
There are times when certain data is required to be kept for a certain period of time due to legal, regulatory or policy reasons. There are also requirements pertaining to when data isn’t supposed to be kept. This is all referred to as data retention.
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Looks like that's it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features