CompTIA Security+ Certification - (SY0-701) Logo
CompTIA Logo

CompTIA Security+ Certification - (SY0-701) Exam Questions

3051

Total Questions

SEP
2025

Last Updated

1st

1st Try Guaranteed

Expert Verified

Experts Verified

Question 11 Single Choice

Upon noticing the registration of a domain that closely resembles your legitimate e-commerce site using 'buyelectronicsnow.com' in place of 'buyelectronixnow.com,' what cybersecurity threat does this scenario most likely represent?

Question 12 Single Choice

What plan outlines reverting to a prior digital intake system at a hospital, if the new one fails upon launch?

Question 13 Single Choice

In the realm of Public Key Infrastructure (PKI), what primary function does a Certificate Authority (CA) serve?

Question 14 Single Choice

For a secure e-commerce platform, which technology ensures communications are genuinely from the company?

Question 15 Single Choice

A cybersecurity specialist observes the following unusual request in the access log of an organization's web server: http://examplecorp.com/login.php?path=../../../etc%00passwd. What type of cybersecurity threat does this request most likely represent, and which resource is the attacker attempting to access?

Question 16 Single Choice

What do we call it when a network's Intrusion Detection System (IDS) mistakenly flags regular user activity as a security threat?

Question 17 Single Choice

Thomas, a finance director, gets an urgent email for a wire transfer from an email claiming to be the company's president at a technology summit. What type of social engineering attack is this?

Question 18 Single Choice

A regional bank branch manager is evaluating strategies to enhance the nighttime security of the building. Which of the following options would primarily serve as deterrent controls at minimal immediate cost?

Question 19 Single Choice

A hospital introduces a new web-based search tool for authorized medical staff to access patient records. A vulnerability analyst reviewing system logs has identified the following search attempt:


Search Text: ' OR '1'='1'; --'


Based on this, what type of attack is likely being attempted?

Question 20 Single Choice

A hospital's medical record system is upgraded to encrypt patient data, with access restricted to authorized personnel and the system logs all data access and modifications. Which cybersecurity principle does this solution emphasize?

Page: 2 / 306