Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?
- A. TPM
- B. ECC
- C. FDE
- D. HSM
Free SY0-701 sample questions for the CompTIA Security+ 2023 exam. No account required: study at your own pace.
Want an interactive quiz? Take the full SY0-701 practice testLooking for more? Click here to get the full PDF with 590+ practice questions for $10 for offline study and deeper preparation.
Which of the following should be used to ensure an attacker is unable to read the contents of a mobile device's drive if the device is lost?
A penetration tester finds an unused Ethernet port during an on-site penetration test. Upon plugging a device into the unused port, the penetration tester notices that the machine is assigned an IP address, allowing the tester to enumerate the local network. Which of the following should an administrator implement in order to prevent this situation from happening in the future?
Which of the following phases of the incident response process attempts to minimize disruption?
A security administrator needs a method to secure data in an environment that includes some form of checks so track any changes. Which of the following should the administrator set up to achieve this goal?
A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?
Which of the following would enable a data center to remain operational through a multiday power outage?
An alert references attacks associated with a zero-day exploit. An analyst places a bastion host in the network to reduce the risk of the exploit. Which of the following types of controls is the analyst implementing?
Which of the following should a company use to provide proof of external network security testing?
Which of the following are the first steps an analyst should perform when developing a heat map? (Choose two.)
After a security incident, a systems administrator asks the company to buy a NAC platform. Which of the following attack surfaces is the systems administrator trying to protect?
A company's end users are reporting that they are unable to reach external websites. After reviewing the performance data for the DNS severs, the analyst discovers that the CPU, disk, and memory usage are minimal, but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to this server. Which of the following best describes what the security analyst is seeing?
A security team receives reports about high latency and complete network unavailability throughout most of the office building. Flow logs from the campus switches show high traffic on TCP 445. Which of the following is most likely the root cause of this incident?
A security team is setting up a new environment for hosting the organization's on-premises software application as a cloud-based service. Which of the following should the team ensure is in place in order for the organization to follow security best practices?
A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?
A company's accounting department receives an urgent payment message from the company's bank domain with instructions to wire transfer funds. The sender requests that the transfer be completed as soon as possible. Which of the following attacks is described?
A security analyst learns that an attack vector, which was used as a part of a recent incident, was a well-known IoT device exploit. The analyst needs to review logs to identify the time of initial exploit. Which of the following logs should the analyst review first?
During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?
Which of the following best practices gives administrators a set period to perform changes to an operational system to ensure availability and minimize business impacts?
Which of the following is used to improve security and overall functionality without losing critical application data?
A systems administrator uses a key to encrypt a message being sent to a peer in a different branch office. The peer then uses the same key to decrypt the message. Which of the following describes this example?
Download the complete SY0-701 study bundle with 590+ questions in a single printable PDF.