CompTIA SY0-701 Exam Questions
CompTIA Security+ (Page 9 )

Updated On: 27-Apr-2026

An analyst is performing a vulnerability scan against the web servers exposed to the internet without a system account. Which of the following is most likely being performed?

  1. Non-credentialed scan
  2. Packet capture
  3. Privilege escalation
  4. System enumeration
  5. Passive scan

Answer(s): A

Explanation:

Option A is correct because a non-credentialed (unauthenticated) vulnerability scan tests from an external perspective without system credentials, typical for internet-facing web servers. Incorrect — B: Packet capture is network traffic capture, not a vulnerability scan. Incorrect — C: Privilege escalation occurs after gaining access, not during external scanning. Incorrect — D: System enumeration involves gathering details from a host with credentials or local access. Incorrect — E: Passive scan is non-intrusive and may not identify active vulnerabilities; active non-credentialed scans are common for external systems.



A security administrator is hardening corporate systems and applying appropriate mitigations by consulting a real-world knowledge base for adversary behavior. Which of the following would be best for the administrator to reference?

  1. MITRE ATT&CK
  2. CSIRT
  3. CVSS
  4. SOAR

Answer(s): A

Explanation:

Option A is correct because MITRE ATT&CK provides a comprehensive, real-world knowledge base of adversary tactics, techniques, and procedures (TTPs) used in cyberattacks, enabling effective threat modeling and mitigations. Incorrect — B CSIRT: CSIRT is a team responsible for incident response and handling security incidents, not a knowledge base of adversary behavior. Incorrect — C CVSS: CVSS scores quantify vulnerability severity, not attacker techniques or behavior. Incorrect — D SOAR: SOAR is a platform for security orchestration, automation, and response, not a reference knowledge base of adversary behavior.



An architect has a request to increase the speed of data transfer using JSON requests externally. Currently, the organization uses SFTP to transfer data files. Which of the following will most likely meet the requirements?

  1. A website-hosted solution
  2. Cloud shared storage
  3. A secure email solution
  4. Microservices using API

Answer(s): D

Explanation:

Option D is correct because microservices using API enable programmatic, low-latency JSON-based data exchange over HTTP/HTTPS, increasing transfer speed and automation compared to file-based SFTP. A) A website-hosted solution may provide access but not inherently improve API-driven JSON transfer performance or security controls. B) Cloud shared storage is file/object-based and introduces additional transfer steps and latency; it’s not optimized for JSON API calls. C) A secure email solution is unsuitable for large data transfers and lacks structured API-based JSON mobility. INSUFFICIENT_KNOWLEDGE



Which of the following addresses individual rights such as the right to be informed, the right of access, and the right to be forgotten?

  1. GDPR
  2. PCI DSS
  3. NIST
  4. ISO

Answer(s): A

Explanation:

Option A is correct because GDPR (General Data Protection Regulation) governs individual privacy rights including the right to be informed, access, and erasure (right to be forgotten). Incorrect — B PCI DSS focuses on payment card security and does not address personal data rights. Incorrect — C NIST provides cybersecurity frameworks and best practices, not individual data-right guarantees. Incorrect — D ISO refers to various standards bodies (e.g., ISO/IEC 27001) but GDPR specifically enshrines these individual rights; ISO alone does not.



An administrator is installing an LDAP browser tool in order to view objects in the corporate LDAP directory. Secure connections to the LDAP server are required. When the browser connects to the server, certificate errors are being displayed, and then the connection is terminated. Which of the following is the most likely solution?

  1. The administrator should allow SAN certificates in the browser configuration.
  2. The administrator needs to install the server certificate into the local truststore.
  3. The administrator should request that the secure LDAP port be opened to the server.
  4. The administrator needs to increase the TLS version on the organization's RA.

Answer(s): B

Explanation:

Option B is correct because LDAP over TLS (LDAPS) requires the client to trust the server certificate. Installing the server certificate into the local truststore (root/CA) validates the server’s identity and prevents certificate errors that terminate the connection.
A) Incorrect — Allowing SAN certificates in the browser configuration is unrelated to trust of the server certificate; the issue is trust, not SAN handling.
C) Incorrect — Opening the secure LDAP port is unnecessary if trustchain validation fails; connection is terminated due to certificate trust, not port filtering.
D) Incorrect — Increasing the TLS version on RA (likely a CA/RA component) does not address the client’s certificate trust issue.



Which of the following is the most important security concern when using legacy systems to provide production service?

  1. Instability
  2. Lack of vendor support
  3. Loss of availability
  4. Use of insecure protocols

Answer(s): B

Explanation:

Option B is correct because lack of vendor support means no security patches, updates, or guidance for legacy systems, leaving unpatched vulnerabilities and increased risk exposure in production services.
A) Incorrect — instability may occur, but it’s not the principal security concern; systems can be updated or mitigated, whereas unsupported software lacks critical patches.
C) Incorrect — loss of availability is possible but stems from vulnerabilities; vendor support primarily addresses patching and defense.
D) Incorrect — insecure protocols are a risk, but the core issue with legacy systems is the end of vendor updates and security fixes, not just protocol choices.



A security investigation revealed that malicious software was installed on a server using a server administrator's credentials. During the investigation, the server administrator explained that Telnet was regularly used to log in.
Which of the following most likely occurred?

  1. A spraying attack was used to determine which credentials to use.
  2. A packet capture tool was used to steal the password.
  3. A remote-access Trojan was used to install the malware.
  4. A dictionary attack was used to log in as the server administrator.

Answer(s): B

Explanation:

Option B is correct because: A packet capture tool would enable an attacker to intercept credentials in transit if Telnet was used, since Telnet transmits in plaintext, allowing password capture during login and subsequent malware installation.
A) Incorrect — A spraying attack targets many accounts with a few credentials, not specifically tied to Telnet or credential theft during login.
C) Incorrect — A remote-access Trojan is a payload installed after access, not the method by which credentials were captured via Telnet.
D) Incorrect — A dictionary attack attempts to brute-force a password offline or online, not necessarily facilitated by captured in-flight credentials via Telnet.



A user is requesting Telnet access to manage a remote development web server. Insecure protocols are not allowed for use within any environment. Which of the following should be configured to allow remote access to this server?

  1. HTTPS
  2. SNMPv3
  3. SSH
  4. RDP
  5. SMTP

Answer(s): C

Explanation:

Option C is correct because SSH provides encrypted remote command-line access, replacing insecure Telnet for secure management of remote servers.
A) Incorrect — HTTPS is for web traffic encryption, not remote server management access by a shell.
B) Incorrect — SNMPv3 is for secure network device monitoring, not interactive remote server administration.
D) Incorrect — RDP is a remote desktop protocol; while it can provide remote access, it is less suited for secure command-line server management and introduces broader attack surface without explicit tunneling.
E) Incorrect — SMTP is for email delivery, not remote server administration.



Viewing page 9 of 102
Viewing questions 65 - 72 out of 804 questions


SY0-701 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!