CompTIA SY0-701 Exam Questions
CompTIA Security+ (Page 19 )

Updated On: 27-Apr-2026

A company is redesigning its infrastructure and wants to reduce the number of physical servers in use. Which of the following architectures is best suited for this goal?

  1. Isolation
  2. Segmentation
  3. Virtualization
  4. Redundancy

Answer(s): C

Explanation:

Virtualization allows multiple virtual machines (VMs) to run on a single physical server, reducing the need for multiple physical servers. This approach consolidates workloads, optimizes hardware usage, and lowers operational costs by enabling multiple isolated environments on fewer physical devices.



Which of the following security concepts is being followed when implementing a product that offers protection against DDoS attacks?

  1. Availability
  2. Non-repudiation
  3. Integrity
  4. Confidentiality

Answer(s): A

Explanation:

DDoS (Distributed Denial of Service) attacks aim to overwhelm resources and make services unavailable to legitimate users. By implementing protection against DDoS attacks, the organization is focusing on maintaining the availability of its services, ensuring that they remain accessible even in the face of such attacks.



A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?

  1. Set the maximum data retention policy.
  2. Securely store the documents on an air-gapped network.
  3. Review the documents' data classification policy.
  4. Conduct a tabletop exercise with the team.

Answer(s): D

Explanation:

A tabletop exercise allows the team to walk through various incident response scenarios using the new documentation, helping to ensure everyone understands their roles and the procedures. This step verifies the effectiveness of the documentation, identifies any gaps, and provides practical experience for the team, which is essential for effective incident response.



After failing an audit twice, an organization has been ordered by a government regulatory agency to pay fines.
Which of the following causes this action?

  1. Non-compliance
  2. Contract violations
  3. Government sanctions
  4. Rules of engagement

Answer(s): A

Explanation:

Failure to meet regulatory standards or requirements (non-compliance) can result in fines and penalties imposed by a government regulatory agency. When an organization does not comply with mandated regulations or fails audits, it may face financial repercussions to enforce adherence to required standards.



A company is developing a critical system for the government and storing project information on a fileshare. Which of the following describes how this data will most likely be classified? (Choose two.)

  1. Private
  2. Confidential
  3. Public
  4. Operational
  5. Urgent
  6. Restricted

Answer(s): B,F

Explanation:

Since the company is developing a critical system for the government, project information would likely be classified as Confidential to prevent unauthorized access and maintain secrecy, and Restricted to limit access strictly to authorized personnel only, given the sensitivity and importance of government-related work.



Which of the following activities is included in the post-incident review phase?

  1. Determining the root cause of the incident
  2. Developing steps to mitigate the risks of the incident
  3. Validating the accuracy of the evidence collected during the investigation
  4. Reestablishing the compromised system's configuration and settings

Answer(s): A

Explanation:

During the post-incident review, the team analyzes the incident to understand its root cause. This phase is focused on learning from the incident, identifying vulnerabilities, and implementing improvements to prevent similar future incidents.



Which of the following attacks exploits a potential vulnerability as a result of using weak cryptographic algorithms?

  1. Password cracking
  2. On-path
  3. Digital signing
  4. Side-channel

Answer(s): A

Explanation:

Weak cryptographic algorithms make it easier for attackers to crack passwords by using techniques such as brute-force or dictionary attacks. When encryption algorithms are weak, they produce predictable patterns or can be processed faster, allowing attackers to break the encryption and recover sensitive information, such as passwords, more easily.



Which of the following is a preventive physical security control?

  1. Video surveillance system
  2. Bollards
  3. Alarm system
  4. Motion sensors

Answer(s): B

Explanation:

Bollards are physical barriers that prevent unauthorized vehicle access to certain areas, helping to protect a facility by physically blocking entry. Unlike detection-focused controls like video surveillance, alarms, and motion sensors, bollards serve as a proactive, preventive measure by stopping threats before they can reach the facility.



Viewing page 19 of 102
Viewing questions 145 - 152 out of 804 questions


SY0-701 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!