CompTIA SY0-701 Exam Questions
CompTIA Security+ (Page 6 )

Updated On: 27-Apr-2026

A network team segmented a critical, end-of-life server to a VLAN that can only be reached by specific devices but cannot be reached by the perimeter network. Which of the following best describe the controls the team implemented? (Choose two.)

  1. Managerial
  2. Physical
  3. Corrective
  4. Detective
  5. Compensating
  6. Technical
  7. Deterrent

Answer(s): E,F

Explanation:

Option E and F are correct because:
Correct — Compensating controls (E) substitute for an unavailable or out-of-date control, providing equivalent protection by isolating the server on a restricted VLAN to limit exposure. Correct — Technical controls (F) use technology (VLAN segmentation, ACLs) to enforce access restrictions rather than relying on people or processes alone.
A) Incorrect — Managerial controls pertain to governance and policy, not the technical network segmentation described.
B) Incorrect — Physical controls relate to tangible protections (locks, guards), not network isolation.
C) Incorrect — Corrective controls restore systems after incidents; not about preventing access.
D) Incorrect — Detective controls identify events; not the implemented preventive segmentation.
G) Incorrect — Deterrent controls discourage actions but do not enforce the VLAN-implemented access restrictions.



A threat actor was able to use a username and password to log in to a stolen company mobile device. Which of the following provides the best solution to increase mobile data security on all employees' company mobile devices?

  1. Application management
  2. Full disk encryption
  3. Remote wipe
  4. Containerization

Answer(s): C

Explanation:

Option C is correct because remote wipe ensures data on a lost or stolen device can be erased to prevent unauthorized access, addressing the scenario where credentials were used on a stolen device. A) Application management controls app deployment but does not guarantee data removal after loss. B) Full disk encryption protects data at rest but does not mitigate ongoing risk if device is compromised and accessible. D) Containerization isolates corporate data, but remote wipe is the more urgent control for a stolen device scenario to immediately purge data.



Which of the following best describes the risk present after controls and mitigating factors have been applied?

  1. Residual
  2. Avoided
  3. Inherent
  4. Operational

Answer(s): A

Explanation:

Option A is correct because residual risk remains after controls and mitigations are applied. A) Residual risk describes the portion of risk still present despite safeguards. B) Avoided risk refers to risk eliminated by decision or control, not remaining. C) Inherent risk is the baseline risk before controls. D) Operational risk involves day-to-day risks from business processes, not the post-control risk level.



A software development team asked a security administrator to recommend techniques that should be used to reduce the chances of the software being reverse engineered. Which of the following should the security administrator recommend?

  1. Digitally signing the software
  2. Performing code obfuscation
  3. Limiting the use of third-party libraries
  4. Using compile flags

Answer(s): B

Explanation:

Option B is correct because code obfuscation makes reverse engineering harder by transforming the code to a less readable form without changing functionality, increasing the effort required to analyze.
A) Incorrect — Digitally signing ensures integrity and authenticity, not obfuscation or reverse-engineering resistance.
C) Incorrect — Limiting third-party libraries reduces dependency risk but does not directly impede reverse engineering of the compiled code.
D) Incorrect — Compile flags optimize or alter build behavior but do not inherently protect against reverse engineering after compilation.



Which of the following is a possible factor for MFA?

  1. Something you exhibit
  2. Something you have
  3. Somewhere you are
  4. Someone you know

Answer(s): B

Explanation:

Option B is correct because "Something you have" is a classic factor used in multi-factor authentication (MFA), representing possession-based credentials like a token, smart card, or mobile device. Incorrect — A) "Something you exhibit" is not a standard MFA factor; it might imply behavioral traits or biometrics but the canonical three factors are something you know, have, or are. C) "Somewhere you are" aligns with location-based access control, not a primary MFA factor. D) "Someone you know" is not a recognized MFA factor; it would imply social or acquaintance-based data, not a verifiable authentication factor.



Easy-to-guess passwords led to an account compromise. The current password policy requires at least 12 alphanumeric characters, one uppercase character, one lowercase character, a password history of two passwords, a minimum password age of one day, and a maximum password age of 90 days. Which of the following would reduce the risk of this incident from happening again? (Choose two.)

  1. Increasing the minimum password length to 14 characters.
  2. Upgrading the password hashing algorithm from MD5 to SHA-512.
  3. Increasing the maximum password age to 120 days.
  4. Reducing the minimum password length to ten characters.
  5. Reducing the minimum password age to zero days.
  6. Including a requirement for at least one special character.

Answer(s): A,F

Explanation:

Option A is correct because increasing minimum length to 14 characters strengthens brute-force and credential-stuffing resilience, aligning with best practices for password entropy. Option F is correct because requiring a special character increases complexity, reducing guessability.
A) Incorrect explanations: Not chosen? Actually A is correct; must explain why it helps.
B) Incorrect — Hash algorithm choice protects stored passwords, not the likelihood of guessing during entry; MD5 is insecure but changing to SHA-512 mitigates offline attacks, not online guessing risk in this scenario.
C) Incorrect — Increasing max age lengthens exposure; harms security by allowing longer-use passwords.
D) Incorrect — Reducing length weakens entropy, increasing risk.
E) Incorrect — Reducing min age to zero encourages immediate changes or none; not a direct effect on guessing risk.



A user downloaded software from an online forum. After the user installed the software, the security team observed external network traffic connecting to the user's computer on an uncommon port. Which of the following is the most likely explanation of this unauthorized connection?

  1. The software had a hidden keylogger.
  2. The software was ransomware.
  3. The user's computer had a fileless virus.
  4. The software contained a backdoor.

Answer(s): D

Explanation:

Option D is correct because a backdoor provides unauthorized remote access, enabling external connections on nonstandard ports after software is installed from an untrusted source. A) Hidden keylogger is a credential-theft feature, not specifically about external connections on an uncommon port. B) Ransomware encrypts files and demands payment, typically not just external connections. C) Fileless malware resides in memory or uses legitimate tools; it can communicate externally but the scenario most directly indicates deliberate backdoor access. Incorrect options lack the clear backdoor mechanism to explain persistent anomalous outbound traffic on an uncommon port.



A utility company is designing a new platform that will host all the virtual machines used by business applications. The requirements include:

A starting baseline of 50% memory utilization
Storage scalability
Single circuit failure resilience
Which of the following best meets all of these requirements?

  1. Connecting dual PDUs to redundant power supplies
  2. Transitioning the platform to an IaaS provider
  3. Configuring network load balancing for multiple paths
  4. Deploying multiple large NAS devices for each host

Answer(s): B

Explanation:

Option B is correct because moving to an IaaS provider offers scalable storage, VM hosting, and elasticity to meet growth (storage scalability) and utilization needs, with inherent resilience through service-level designs. Option A is incorrect because dual PDUs and redundant power address power reliability, not memory utilization or VM hosting scalability. Option C is incorrect because network load balancing focuses on distributing traffic, not providing scalable storage or baseline memory utilization for a VM platform. Option D is incorrect because deploying multiple large NAS devices increases storage capacity but does not inherently provide baseline memory utilization management or single circuit failure resilience for all VMs.



Viewing page 6 of 102
Viewing questions 26 - 30 out of 804 questions


SY0-701 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!