Pass4Future also provide interactive practice exam software for preparing CompTIA Security+ Certification (SY0-701) Exam effectively. You are welcome to explore sample free CompTIA SY0-701 Exam questions below and also try CompTIA SY0-701 Exam practice test software.
Do you know that you can access more real CompTIA SY0-701 exam questions via Premium Access? ()
Which of the following is prevented by proper data sanitization?
Answer : A
Proper data sanitization ensures that sensitive data is securely erased from storage devices, preventing unauthorized access or recovery when the devices are disposed of or reused. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 5: Security Program Management, Section: 'Data Sanitization and Disposal Methods'.
Which of the following is the best way to prevent an unauthorized user from plugging a laptop into an employee's phone network port and then using tools to scan for database servers?
Answer : A
MAC filtering allows network administrators to control device access by specifying allowed MAC addresses. This prevents unauthorized devices, such as a laptop plugged into a network port, from gaining access. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 2: Threats and Vulnerabilities, Section: 'Network Access Control Methods'.
Which of the following describes the procedures a penetration tester must follow while conducting a test?
Answer : A
Rules of engagement specify the agreed-upon boundaries, scope, and procedures for a penetration test to ensure compliance and avoid disruption to the environment. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: 'Penetration Testing Procedures'.
Which of the following is the stage in an investigation when forensic images are obtained?
Answer : A
The acquisition phase involves creating forensic images (exact replicas) of storage devices or memory to ensure data integrity for further analysis. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: 'Forensic Imaging and Chain of Custody'.
A security analyst learns that an attack vector, used as part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of the initial exploit. Which of the following logs should the analyst review first?
Answer : C
Firewall logs provide details of all network traffic, including connections to and from IoT devices. They are typically the first source of evidence for identifying the time of an exploit. Reference: CompTIA Security+ SY0-701 Study Guide, Domain 4: Security Operations, Section: 'Log Analysis for Incident Response'.