CompTIA Security+ Certification - (SY0-701) Logo
CompTIA Logo

CompTIA Security+ Certification - (SY0-701) Exam Questions

3051

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 1 Single Choice

Which of the following options correctly identifies examples of preventive security controls?

Question 2 Single Choice

A software company processes online payments for its products and needs to store customer billing information securely. To securely store customer billing info, which method uses random values and a secure table for protection?

Question 3 Single Choice

Which category of threat actor is commonly involved in activities aimed at monetary gain through mechanisms like ransomware deployment or unauthorized acquisition of sensitive data?

Question 4 Single Choice

An enterprise's data storage systems have suddenly become inaccessible, with a note appearing on several employees' screens demanding a cryptocurrency transaction to restore access. What cybersecurity threat has the organization encountered?

Question 5 Single Choice

A software development company is launching a suite of online productivity tools. Each tool will have its own subdomain (timemanage.softwarecompany.com, goals.softwarecompany.com, etc.). To streamline its security administration, which type of certificate would be most efficient?

Question 6 Single Choice

A hospital is seeking to upgrade its wireless network to include TLS-based encryption for strong user authentication and to safeguard sensitive patient data. Which of the following protocols is best suited for this requirement?

Question 7 Single Choice

A software company develops a new user registration system. To safeguard user passwords, they apply a technique that makes it significantly harder and more time-consuming for attackers to guess the passwords, even for weak or commonly used ones. Which of the following describes this technique?

Question 8 Single Choice

When conducting a cyber assault, an adversary opts to use a few common passwords across numerous user accounts instead of attempting numerous passwords for one user account. Identify the attack being utilized here.

Question 9 Single Choice

After installing a graphics program from a link that Maria found on a social media website, she noticed unexpected toolbars in her browser that she hadn't installed. What is the primary reason for this unwelcome software?

Question 10 Single Choice

An e-commerce website frequently promotes flash sales with limited-time discounts. This brings in unexpected surges of customer traffic followed by periods of normal shopping activity. Which cloud computing principle offers the most efficient way to manage the web server resource requirements of this website?

Page: 1 / 306