

CompTIA Security+ Certification - (SY0-701) Exam Questions
Total Questions
Last Updated
1st Try Guaranteed

Experts Verified
Question 11 Single Choice
Upon noticing the registration of a domain that closely resembles your legitimate e-commerce site using 'buyelectronicsnow.com' in place of 'buyelectronixnow.com,' what cybersecurity threat does this scenario most likely represent?
Explanation

Click "Show Answer" to see the explanation here
Typosquatting is a method that involves malicious actors registering domains that mimic legitimate businesses to deceive users into visiting fraudulent websites. This often leads to phishing scams or malware distribution, potentially resulting in financial loss or unauthorized access to sensitive information. It exploits common typographical errors that users may make when entering a website address, increasing the risk of accidentally exposing themselves to these threats.
Incorrect Answers Explained:
A. Spear Phishing is a targeted form of phishing where attackers focus on specific individuals or organizations to steal information or infect systems with malware. While it's a sophisticated attack method, spear phishing doesn't inherently involve the registration of misleading domains. However, typosquatted domains can sometimes be used in spear phishing campaigns to increase their effectiveness.
B. Phishing is a broader term for attacks seeking to trick individuals into divulging sensitive information via deceptive emails or messages. While phishing attacks can utilize websites created through typosquatting, the act of typosquatting specifically refers to the registration and use of similarly spelled domain names for malicious intent.
C. Organized Crime refers to groups engaging in illegal activities for profit, including cybercrime. This option is too broad and does not specifically address the act of registering domain names similar to legitimate businesses for malicious purposes, such as phishing or distributing malware.
Explanation
Typosquatting is a method that involves malicious actors registering domains that mimic legitimate businesses to deceive users into visiting fraudulent websites. This often leads to phishing scams or malware distribution, potentially resulting in financial loss or unauthorized access to sensitive information. It exploits common typographical errors that users may make when entering a website address, increasing the risk of accidentally exposing themselves to these threats.
Incorrect Answers Explained:
A. Spear Phishing is a targeted form of phishing where attackers focus on specific individuals or organizations to steal information or infect systems with malware. While it's a sophisticated attack method, spear phishing doesn't inherently involve the registration of misleading domains. However, typosquatted domains can sometimes be used in spear phishing campaigns to increase their effectiveness.
B. Phishing is a broader term for attacks seeking to trick individuals into divulging sensitive information via deceptive emails or messages. While phishing attacks can utilize websites created through typosquatting, the act of typosquatting specifically refers to the registration and use of similarly spelled domain names for malicious intent.
C. Organized Crime refers to groups engaging in illegal activities for profit, including cybercrime. This option is too broad and does not specifically address the act of registering domain names similar to legitimate businesses for malicious purposes, such as phishing or distributing malware.
Question 12 Single Choice
What plan outlines reverting to a prior digital intake system at a hospital, if the new one fails upon launch?
Explanation

Click "Show Answer" to see the explanation here
A backout plan is a set of procedures designed to restore a system to its previous working state after an unsuccessful change or rollout. In this case, it ensures the hospital can quickly revert to its stable digital forms if the new version proves faulty.
Incorrect Answers Explained:
A. Change Control Procedure provides guidelines for authorizing and managing changes but doesn't outline the detailed steps of undoing a specific change.
B. User Training Guide addresses how to use a system, but not the process of restoring a prior version if the new update causes issues.
D. Continuity of Operations Plan focuses on broader procedures for maintaining essential functions during disruptive events, not the specific process of reversing a single change.
Explanation
A backout plan is a set of procedures designed to restore a system to its previous working state after an unsuccessful change or rollout. In this case, it ensures the hospital can quickly revert to its stable digital forms if the new version proves faulty.
Incorrect Answers Explained:
A. Change Control Procedure provides guidelines for authorizing and managing changes but doesn't outline the detailed steps of undoing a specific change.
B. User Training Guide addresses how to use a system, but not the process of restoring a prior version if the new update causes issues.
D. Continuity of Operations Plan focuses on broader procedures for maintaining essential functions during disruptive events, not the specific process of reversing a single change.
Question 13 Single Choice
In the realm of Public Key Infrastructure (PKI), what primary function does a Certificate Authority (CA) serve?
Explanation

Click "Show Answer" to see the explanation here
In PKI, a Certificate Authority (CA) plays a pivotal role in issuing and managing digital certificates. These serve as a form of "digital passport" that helps establish trust in the authenticity of various entities such as users, websites, and organizations, enabling secure communications across networks.
Incorrect Answers Explained:
A. Confidentiality is essential in cybersecurity, but the tasks of encryption and decryption fall to cryptographic algorithms, not Certificate Authorities (CAs). While CAs issue digital certificates that underpin secure communications, they don't directly encrypt or decrypt data. Instead, these certificates enable cryptographic algorithms to perform encryption and decryption by establishing trust and verifying identity.
C. While digital signatures, facilitated by Public Key Infrastructure (PKI), offer non-repudiation by preventing the denial of a signed message, the Certificate Authority's (CA) primary role is to issue certificates that enable digital signatures. The concept of non-repudiation itself, although supported by the mechanisms of digital signatures and certificates, is not directly managed by the CA but is an inherent benefit of using digital signatures.
D. Creating hashes for data integrity verification is a process distinct from the CA's responsibilities. Although digital certificates issued by CAs may contain hashes as part of the certificate's structure to ensure its integrity, the primary function of the CA is centered around the issuance and management of these certificates. The process of hashing itself, which verifies data integrity, operates independently of the CA's activities but is an essential component of the broader security framework that includes digital certificates.
Explanation
In PKI, a Certificate Authority (CA) plays a pivotal role in issuing and managing digital certificates. These serve as a form of "digital passport" that helps establish trust in the authenticity of various entities such as users, websites, and organizations, enabling secure communications across networks.
Incorrect Answers Explained:
A. Confidentiality is essential in cybersecurity, but the tasks of encryption and decryption fall to cryptographic algorithms, not Certificate Authorities (CAs). While CAs issue digital certificates that underpin secure communications, they don't directly encrypt or decrypt data. Instead, these certificates enable cryptographic algorithms to perform encryption and decryption by establishing trust and verifying identity.
C. While digital signatures, facilitated by Public Key Infrastructure (PKI), offer non-repudiation by preventing the denial of a signed message, the Certificate Authority's (CA) primary role is to issue certificates that enable digital signatures. The concept of non-repudiation itself, although supported by the mechanisms of digital signatures and certificates, is not directly managed by the CA but is an inherent benefit of using digital signatures.
D. Creating hashes for data integrity verification is a process distinct from the CA's responsibilities. Although digital certificates issued by CAs may contain hashes as part of the certificate's structure to ensure its integrity, the primary function of the CA is centered around the issuance and management of these certificates. The process of hashing itself, which verifies data integrity, operates independently of the CA's activities but is an essential component of the broader security framework that includes digital certificates.
Question 14 Single Choice
For a secure e-commerce platform, which technology ensures communications are genuinely from the company?
Explanation

Click "Show Answer" to see the explanation here
Digital certificates issued by a Certificate Authority (CA) act as an electronic "passport," verifying that the company's website is authentic. Customers' browsers recognize trusted CAs, establishing a chain of trust that helps prevent spoofing and fraudulent websites claiming to represent the company. Trusted CAs digitally sign certificates, linking them to a hierarchy that ultimately leads to a root CA inherently trusted by browsers.
Incorrect Answers Explained:
B. Hardware-based Encryption is crucial for protecting data on the servers, it doesn't directly address the customer's need to verify the site's identity.
C. Secure Passwords are important for backend security, but these don't address the site-to-customer authentication in this scenario.
D. Anti-Phishing Training is vital for employees, but it solves a different security problem compared to website authentication.
Explanation
Digital certificates issued by a Certificate Authority (CA) act as an electronic "passport," verifying that the company's website is authentic. Customers' browsers recognize trusted CAs, establishing a chain of trust that helps prevent spoofing and fraudulent websites claiming to represent the company. Trusted CAs digitally sign certificates, linking them to a hierarchy that ultimately leads to a root CA inherently trusted by browsers.
Incorrect Answers Explained:
B. Hardware-based Encryption is crucial for protecting data on the servers, it doesn't directly address the customer's need to verify the site's identity.
C. Secure Passwords are important for backend security, but these don't address the site-to-customer authentication in this scenario.
D. Anti-Phishing Training is vital for employees, but it solves a different security problem compared to website authentication.
Question 15 Single Choice
A cybersecurity specialist observes the following unusual request in the access log of an organization's web server: http://examplecorp.com/login.php?path=../../../etc%00passwd. What type of cybersecurity threat does this request most likely represent, and which resource is the attacker attempting to access?
Explanation

Click "Show Answer" to see the explanation here
This request indicates a directory traversal attack, where the goal is to access files outside the web server's designated directory. The attacker is targeting the '/etc/passwd' file, using '../../../' to navigate up the directory structure from the current location. The inclusion of '%00' in the URL is a technique potentially used to terminate the input string or bypass security filters, exploiting the system to access the file.
Incorrect Answers Explained:
A. Buffer Overflow attack overflows a buffer's storage capacity, leading to arbitrary code execution or system crashes, which is unrelated to the path traversal attempt depicted.
C. Injection Flaw typically involves inserting malicious code into an application to execute unauthorized commands or SQL queries, distinct from exploiting file paths to access restricted files.
D. Resource Exhaustion focuses on depleting system resources to degrade performance or availability, which does not describe the attempt to access restricted system files shown in the URL.
Explanation
This request indicates a directory traversal attack, where the goal is to access files outside the web server's designated directory. The attacker is targeting the '/etc/passwd' file, using '../../../' to navigate up the directory structure from the current location. The inclusion of '%00' in the URL is a technique potentially used to terminate the input string or bypass security filters, exploiting the system to access the file.
Incorrect Answers Explained:
A. Buffer Overflow attack overflows a buffer's storage capacity, leading to arbitrary code execution or system crashes, which is unrelated to the path traversal attempt depicted.
C. Injection Flaw typically involves inserting malicious code into an application to execute unauthorized commands or SQL queries, distinct from exploiting file paths to access restricted files.
D. Resource Exhaustion focuses on depleting system resources to degrade performance or availability, which does not describe the attempt to access restricted system files shown in the URL.
Question 16 Single Choice
What do we call it when a network's Intrusion Detection System (IDS) mistakenly flags regular user activity as a security threat?
Explanation

Click "Show Answer" to see the explanation here
A false positive occurs when an Intrusion Detection System (IDS) incorrectly identifies benign network activity as malicious. This scenario can be likened to an overly cautious security guard who sounds the alarm for ordinary visitors, mistaking them for intruders. While it's essential for a security system to be vigilant, excessive false positives can lead to wasted resources on investigating harmless activities and, more critically, might dilute focus from genuine threats.
For Example: Suppose an organization's IDS is configured with overly strict rules that flag high volumes of everyday user actions as potential threats—such as accessing common websites or the use of standard office software. Reducing these false positives often involves fine-tuning the IDS's rules and thresholds to achieve a balanced state where the system reliably alerts on actual threats (true positives) without overwhelming the security team with alerts on regular activities. Adjusting these settings requires a careful analysis of the types of false positives encountered and may involve customizing IDS rules to fit the unique traffic patterns and behaviors observed within the organization's network.
Incorrect Answers Explained:
A. False Negative error occurs when the IDS fails to detect an actual threat, letting malicious activities go unnoticed.
B. True Negative, when the IDS correctly identifies an action as safe, which is the ideal situation for normal activities.
C. True Positive refers to the IDS correctly spotting and alerting on actual harmful behavior, exactly what it's designed to do.
Explanation
A false positive occurs when an Intrusion Detection System (IDS) incorrectly identifies benign network activity as malicious. This scenario can be likened to an overly cautious security guard who sounds the alarm for ordinary visitors, mistaking them for intruders. While it's essential for a security system to be vigilant, excessive false positives can lead to wasted resources on investigating harmless activities and, more critically, might dilute focus from genuine threats.
For Example: Suppose an organization's IDS is configured with overly strict rules that flag high volumes of everyday user actions as potential threats—such as accessing common websites or the use of standard office software. Reducing these false positives often involves fine-tuning the IDS's rules and thresholds to achieve a balanced state where the system reliably alerts on actual threats (true positives) without overwhelming the security team with alerts on regular activities. Adjusting these settings requires a careful analysis of the types of false positives encountered and may involve customizing IDS rules to fit the unique traffic patterns and behaviors observed within the organization's network.
Incorrect Answers Explained:
A. False Negative error occurs when the IDS fails to detect an actual threat, letting malicious activities go unnoticed.
B. True Negative, when the IDS correctly identifies an action as safe, which is the ideal situation for normal activities.
C. True Positive refers to the IDS correctly spotting and alerting on actual harmful behavior, exactly what it's designed to do.
Question 17 Single Choice
Thomas, a finance director, gets an urgent email for a wire transfer from an email claiming to be the company's president at a technology summit. What type of social engineering attack is this?
Explanation

Click "Show Answer" to see the explanation here
This scenario typifies a whaling attack, where cybercriminals impersonate senior executives to manipulate employees into executing unauthorized financial transactions or divulging sensitive information. The tactic relies on the perceived urgency and authority of the request to bypass normal security protocols.
Incorrect Answers Explained:
B. Spear Phishing is similar to whaling in its targeted approach but it does not necessarily involve impersonating high-ranking officials within an organization. It can target various employees with crafted messages specific to the individual's perceived interests or responsibilities.
C. Impersonation refers to any attack where the attacker pretends to be someone else to gain trust or information. While it is a component of a whaling attack, it is not specific enough to describe the full scope of the scenario provided, which involves targeting a high-ranking company official.
D. Credential Harvesting involves collecting login credentials or other sensitive information, often through deceptive means like phishing websites. While related to the deceptive element of the given scenario, it doesn't capture the targeted, high-profile nature of a whaling attack.
Explanation
This scenario typifies a whaling attack, where cybercriminals impersonate senior executives to manipulate employees into executing unauthorized financial transactions or divulging sensitive information. The tactic relies on the perceived urgency and authority of the request to bypass normal security protocols.
Incorrect Answers Explained:
B. Spear Phishing is similar to whaling in its targeted approach but it does not necessarily involve impersonating high-ranking officials within an organization. It can target various employees with crafted messages specific to the individual's perceived interests or responsibilities.
C. Impersonation refers to any attack where the attacker pretends to be someone else to gain trust or information. While it is a component of a whaling attack, it is not specific enough to describe the full scope of the scenario provided, which involves targeting a high-ranking company official.
D. Credential Harvesting involves collecting login credentials or other sensitive information, often through deceptive means like phishing websites. While related to the deceptive element of the given scenario, it doesn't capture the targeted, high-profile nature of a whaling attack.
Question 18 Single Choice
A regional bank branch manager is evaluating strategies to enhance the nighttime security of the building. Which of the following options would primarily serve as deterrent controls at minimal immediate cost?
Explanation

Click "Show Answer" to see the explanation here
Warning signs and brightly lit areas are powerful deterrents for security. Signs signal that the building is protected and that unauthorized entry will have consequences. This alone can discourage potential attackers. Enhanced lighting removes hiding spots and makes it feel like someone is always watching. Together, these visible measures make a potential criminal think twice, as the risk of getting caught seems too high.
Incorrect Answers Explained:
A. Motion Sensors and Intrusion Detection Alarms alert personnel that an intrusion is happening, not dissuading someone from attempting it in the first place.
C. Biometric Access Systems and Security Cameras are excellent security measures, the focus is detection (cameras) and controlling who enters (biometrics), not initial deterrence.
D. Regularly Scheduled Security Patrols and Guard Dogs are active preventative measures that provide a different form of security but they aren't the initial deterrent like signs and lighting.
Explanation
Warning signs and brightly lit areas are powerful deterrents for security. Signs signal that the building is protected and that unauthorized entry will have consequences. This alone can discourage potential attackers. Enhanced lighting removes hiding spots and makes it feel like someone is always watching. Together, these visible measures make a potential criminal think twice, as the risk of getting caught seems too high.
Incorrect Answers Explained:
A. Motion Sensors and Intrusion Detection Alarms alert personnel that an intrusion is happening, not dissuading someone from attempting it in the first place.
C. Biometric Access Systems and Security Cameras are excellent security measures, the focus is detection (cameras) and controlling who enters (biometrics), not initial deterrence.
D. Regularly Scheduled Security Patrols and Guard Dogs are active preventative measures that provide a different form of security but they aren't the initial deterrent like signs and lighting.
Question 19 Single Choice
A hospital introduces a new web-based search tool for authorized medical staff to access patient records. A vulnerability analyst reviewing system logs has identified the following search attempt:
Search Text: ' OR '1'='1'; --'
Based on this, what type of attack is likely being attempted?
Explanation

Click "Show Answer" to see the explanation here
The modified search text attempts to exploit an input validation flaw that allows the injection of SQL commands. The injected SQL code includes a condition that always evaluates to true ('1'='1'), effectively bypassing any authentication or authorization checks. The semicolon and double hyphens are used to terminate the current SQL statement and comment out any remaining SQL code. If successful, this could potentially allow unauthorized access to patient records.
For further explanation:
"The single quote after the 'OR' clause is used to close the existing SQL query to avoid syntax errors.
"The '1=1' condition within the single quotes is a condition that always evaluates to true, effectively bypassing any authentication or authorization checks.
"The semicolon (;) is used to terminate the current SQL statement.
"The double hyphens (--) are used to comment out the rest of the SQL query, ensuring that any subsequent SQL code is ignored."
Incorrect Answers Explained:
B. CSRF is a type of attack that tricks a logged-in user into performing actions they didn't intend to, such as sending a request to a web application on which they are currently authenticated. It does not involve direct manipulation of a database through SQL queries, hence not applicable to the given scenario where the attack involves manipulating SQL queries.
C. A buffer overflow attack occurs when more data is written to a buffer than it can hold, potentially allowing an attacker to overwrite memory locations adjacent to the buffer. This type of attack is unrelated to SQL injection, which involves injecting malicious SQL statements into a query. The given pattern (' OR '1'='1'; --) is specific to SQL injection and aims to alter SQL queries, not to overflow memory buffers.
D. LDAP injection attacks involve injecting malicious input into LDAP queries to manipulate or exploit directory services. The given pattern is specific to SQL syntax and is used to manipulate SQL queries, making LDAP injection an incorrect option for the scenario described.
Explanation
The modified search text attempts to exploit an input validation flaw that allows the injection of SQL commands. The injected SQL code includes a condition that always evaluates to true ('1'='1'), effectively bypassing any authentication or authorization checks. The semicolon and double hyphens are used to terminate the current SQL statement and comment out any remaining SQL code. If successful, this could potentially allow unauthorized access to patient records.
For further explanation:
"The single quote after the 'OR' clause is used to close the existing SQL query to avoid syntax errors.
"The '1=1' condition within the single quotes is a condition that always evaluates to true, effectively bypassing any authentication or authorization checks.
"The semicolon (;) is used to terminate the current SQL statement.
"The double hyphens (--) are used to comment out the rest of the SQL query, ensuring that any subsequent SQL code is ignored."
Incorrect Answers Explained:
B. CSRF is a type of attack that tricks a logged-in user into performing actions they didn't intend to, such as sending a request to a web application on which they are currently authenticated. It does not involve direct manipulation of a database through SQL queries, hence not applicable to the given scenario where the attack involves manipulating SQL queries.
C. A buffer overflow attack occurs when more data is written to a buffer than it can hold, potentially allowing an attacker to overwrite memory locations adjacent to the buffer. This type of attack is unrelated to SQL injection, which involves injecting malicious SQL statements into a query. The given pattern (' OR '1'='1'; --) is specific to SQL injection and aims to alter SQL queries, not to overflow memory buffers.
D. LDAP injection attacks involve injecting malicious input into LDAP queries to manipulate or exploit directory services. The given pattern is specific to SQL syntax and is used to manipulate SQL queries, making LDAP injection an incorrect option for the scenario described.
Question 20 Single Choice
A hospital's medical record system is upgraded to encrypt patient data, with access restricted to authorized personnel and the system logs all data access and modifications. Which cybersecurity principle does this solution emphasize?
Explanation

Click "Show Answer" to see the explanation here
This solution prioritizes confidentiality by encrypting sensitive patient data, ensuring only authorized medical staff can access it. Access logs further support confidentiality by tracking any potential unauthorized attempts to view or change records.
Incorrect Answers Explained:
A. While availability is crucial, the question's priority is on securing user data by restricting unauthorized access. This directly aligns with confidentiality.
B. Access logs do contribute to non-repudiation, but the primary focus is to prevent unauthorized individuals from accessing and viewing confidential patient information. Confidentiality is the core security principle addressed.
D. While encryption can help ensure data integrity, the main goal here is preventing unauthorized access to confidential medical records, a confidentiality issue.
Explanation
This solution prioritizes confidentiality by encrypting sensitive patient data, ensuring only authorized medical staff can access it. Access logs further support confidentiality by tracking any potential unauthorized attempts to view or change records.
Incorrect Answers Explained:
A. While availability is crucial, the question's priority is on securing user data by restricting unauthorized access. This directly aligns with confidentiality.
B. Access logs do contribute to non-repudiation, but the primary focus is to prevent unauthorized individuals from accessing and viewing confidential patient information. Confidentiality is the core security principle addressed.
D. While encryption can help ensure data integrity, the main goal here is preventing unauthorized access to confidential medical records, a confidentiality issue.



