Free CompTIA Security+ Certification Exam SY0-701 Exam Practice Test

UNLOCK FULL
SY0-701 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 31
Total Questions: 153
  • Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?

    Answer: C Next Question
  • A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?

    Answer: C Next Question
  • Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?

    Answer: B Next Question
  • A security analyst scans a company's public network and discovers a host is running a remotedesktop that can be used to access the production network. Which of the following changes should the security analyst recommend?

    Answer: B Next Question
  • A security consultant needs secure, remote access to a client environment. Which of the following should the security consultant most likely use to gain access?

    Answer: C Next Question
  • A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?

    Answer: B Next Question
  • Which of the following describes the process of concealing code or text inside a graphical image?

    Answer: D Next Question
  • Which of the following factors are the most important to address when formulating a training curriculum plan for a security awareness program? (Select two).

    Answer: C,E Next Question
  • A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?

    Answer: D Next Question
  • A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to non- encrypted websites?

    Answer: B Next Question
Page: 1 / 31
Total Questions: 153