Download CompTIA Security plus.SY0-701.ExamTopics.2025-09-26.606q.vcex

Vendor: CompTIA
Exam Code: SY0-701
Exam Name: CompTIA Security plus
Date: Sep 26, 2025
File Size: 3 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
  1. Hacktivist
  2. Whistleblower
  3. Organized crime
  4. Unskilled attacker
Correct answer: C
Explanation:
A: 11C: 20 - Mosted
A: 11C: 20 - Mosted
Question 2
Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
  1. Key stretching
  2. Data masking
  3. Steganography
  4. Salting
Correct answer: D
Explanation:
A: 1C: 3D: 24 - Mosted
A: 1C: 3D: 24 - Mosted
Question 3
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
  1. SSO
  2. LEAP
  3. MFA
  4. PEAP
Correct answer: A
Explanation:
A: 12 - Mosted
A: 12 - Mosted
Question 4
Which of the following scenarios describes a possible business email compromise attack?
  1. An employee receives a gift card request in an email that has an executive’s name in the display field of the email.
  2. Employees who open an email attachment receive messages demanding payment in order to access files.
  3. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
  4. An employee receives an email with a link to a phishing site that is designed to look like the company’s email portal.
Correct answer: C
Explanation:
A: 29B: 1C: 35 - MostedD: 5
A: 29B: 1C: 35 - MostedD: 5
Question 5
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
  1. Compensating control
  2. Network segmentation
  3. Transfer of risk
  4. SNMP traps
Correct answer: A
Explanation:
A: 56 - MostedB: 4
A: 56 - MostedB: 4
Question 6
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?
  1. Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53
    Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53
  2. Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53
    Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
  3. Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53
    Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
  4. Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53
    Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Correct answer: D
Explanation:
C: 2D: 33 - Mosted
C: 2D: 33 - Mosted
Question 7
An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a “page not found” error message. Which of the following types of social engineering attacks occurred?
  1. Brand impersonation
  2. Pretexting
  3. Typosquatting
  4. Phishing
Correct answer: D
Explanation:
A: 2C: 1D: 32 - Mosted
A: 2C: 1D: 32 - Mosted
Question 8
An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?
  1. NGFW
  2. WAF
  3. TLS
  4. SD-WAN
Correct answer: B
Explanation:
A: 8B: 36 - Mosted
A: 8B: 36 - Mosted
Question 9
Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:
“I’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.”
Which of the following are the best responses to this situation? (Choose two).
  1. Cancel current employee recognition gift cards.
  2. Add a smishing exercise to the annual company training.
  3. Issue a general email warning to the company.
  4. Have the CEO change phone numbers.
  5. Conduct a forensic investigation on the CEO’s phone.
  6. Implement mobile device management.
Correct answer: BC
Explanation:
BC: 33 - MostedBF: 3
BC: 33 - MostedBF: 3
Question 10
A company is required to use certified hardware when building networks. Which of the following best addresses the risks associated with procuring counterfeit hardware?
  1. A thorough analysis of the supply chain
  2. A legally enforceable corporate acquisition policy
  3. A right to audit clause in vendor contracts and SOWs
  4. An in-depth penetration test of all suppliers and vendors
Correct answer: A
Explanation:
A: 34 - MostedC: 10
A: 34 - MostedC: 10
Question 11
An enterprise has been experiencing attacks focused on exploiting vulnerabilities in older browser versions with well-known exploits. Which of the following security solutions should be configured to best provide the ability to monitor and block these known signature-based attacks?
  1. ACL
  2. DLP
  3. IDS
  4. IPS
Correct answer: D
Explanation:
C: 1D: 34 - Mosted
C: 1D: 34 - Mosted
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!