00:15:00

Free CompTIA Security+ SY0-701 Practice Test

Prepare for the CompTIA Security+ SY0-701 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • General Security Concepts
    • Threats, Vulnerabilities, and Mitigations
    • Security Architecture
    • Security Operations
    • Security Program Management and Oversight
Question 1 of 15

Which of the following options is considered a 'something you have' factor in multifactor authentication?

  • Voice recognition

  • Security token

  • Fingerprint

  • Password

Question 2 of 15

A company is designing a new data center for its mission-critical systems and wants to ensure the highest level of uptime. Which of the following solutions should it implement to best safeguard against power interruptions that could lead to system outages?

  • Power conditioners

  • Backup generators

  • Uninterruptible Power Supply (UPS)

  • Surge protectors

Question 3 of 15

ABC Tech Corporation is considering outsourcing their customer support services to XYZ Support Inc. As part of the vetting process, which of the following is the most appropriate action to ensure due diligence and care is exercised in selecting a third-party vendor?

  • Choose XYZ Support Inc. because they offered the lowest bid, thereby saving on costs

  • Delegate the decision to an intern, assuming that third-party vendors have similar capabilities

  • Conduct an in-depth background check on XYZ Support Inc., which includes financial, reputational, and performance aspects

  • Review the marketing materials of XYZ Support Inc. for their success stories and client testimonials

Question 4 of 15

What best describes the practice of giving users only the permissions they need to perform their work tasks?

  • Complete autonomy

  • Permission auditing

  • Access all areas

  • The principle of least privilege

Question 5 of 15

What is the primary purpose of conducting a system/process audit within an organization?

  • To ensure compliance with security policies and procedures

  • To resolve technical issues within IT systems

  • To replace outdated security systems with newer technology

  • To conduct an in-depth assessment of system vulnerabilities

Question 6 of 15

Your organization has recently experienced an attack, and you need to analyze the incident to understand how the attack was perpetrated and how to prevent similar incidents. Which type of control would be best suited for this purpose?

  • Compensating controls

  • Corrective controls

  • Detective controls

  • Preventive controls

Question 7 of 15

A corporation employs external auditors who require access to the company's server infrastructure for a limited duration. The security policy enforces minimum necessary privileges and mandates that access credentials should expire immediately after the auditing task is completed. Which of the following practices should be implemented to comply with the security policy?

  • Generating non-expiring API keys for auditors to use during their review

  • Allocating time-restricted access tokens for server access

  • Issuing a set of shared credentials that the audit team can use

  • Creating permanent accounts with privileged access for each auditor

Question 8 of 15

In the process of updating the contingency plans to address potential infrastructure failures, what should management prioritize to ensure essential system functions are restored within an optimal timeframe after an unforeseen outage occurs?

  • Keeping a detailed record of equipment and software versions.

  • Creating a schedule for regular data archiving and retrieval tests.

  • Setting specific deadlines for restoring vital operations.

  • Harmonizing the procedural manual with the prevalent statutory requirements.

Question 9 of 15

What does the concept of ongoing supportability in the context of cybersecurity operations entail?

  • The periodic change in security policies dictated by organizational structure.

  • The capacity for continued maintenance and updates of security systems and processes.

  • The initial implementation of security controls in a new system.

  • The step-by-step playbook used for responding to security incidents.

Question 10 of 15

What is the primary role of a generator within the security architecture of a data center?

  • To provide backup power in the event of a main power supply failure

  • To cool down the server racks and prevent overheating

  • To regulate the distribution of power to different circuits

  • To serve as a primary power source during peak operation times

Question 11 of 15

What can an organization implement when a vulnerability cannot be patched immediately, to mitigate the risk while maintaining business functionality?

  • Compensating controls

  • Threat intelligence

  • Encryption

  • Penetration testing

Question 12 of 15

A security analyst is reviewing the organization's incident reports and notices an incident where attackers sent deceptive messages to employees' mobile phones with the intent to trick them into sharing sensitive information. What type of attack does this scenario describe?

  • Exploit Kits via MMS

  • SMS phishing

  • Spyware Installation

  • Direct Malware Injection

Question 13 of 15

Your organization has decided to migrate to a cloud service model. As the IT security professional, you are reviewing the shared responsibility matrix provided by the potential cloud service provider. According to the matrix, which of these responsibilities would typically be managed by your organization rather than the provider in an Infrastructure as a Service (IaaS) model?

  • Environmental control of the hardware

  • Patching of the host operating system

  • Physical security of the data center

  • Virtualization platform management

Question 14 of 15

Your organization is looking to improve its incident response capabilities by implementing security automation. As the security manager, you need to decide which aspect of the incident response process would most benefit from automation. Given the goal to reduce response times and human error, which would be the most effective use of automation?

  • Automating decision-making on how to handle every aspect of the incident response.

  • Automating the initial incident triage to categorize and prioritize incidents based on predefined rules and criteria.

  • Automating communication with the media regarding details of the incident.

  • Automating the entire post-incident report generation without human review.

Question 15 of 15

What type of malware typically encrypts an organization's data and demands payment for the decryption key?

  • Trojan

  • Ransomware

  • Virus

  • Worm