Security+ (SY0-701) Practice Questions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

Security+ (SY0-701) Practice Questions Flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Which of the following is a technical control?

Firewalls

2
New cards

What is the main purpose of a deterrent control?

Discourage an intrusion attempt

3
New cards

Which control type is applied after an event to reduce its impact?

Corrective

4
New cards

Which of these is an example of a compensating control?

Firewall blocks a vulnerable app

5
New cards

What type of control instructs users toward secure behavior?

Directive

6
New cards

What does the 'I' in the CIA triad stand for?

Integrity

7
New cards

Which of the following best helps ensure confidentiality?

Encryption

8
New cards

Which technique verifies data integrity?

Digital signatures

9
New cards

What supports the availability principle of the CIA triad?

Redundancy and fault tolerance

10
New cards

What does non-repudiation ensure?

That a person cannot deny their actions

11
New cards

What cryptographic function is used to verify integrity in non-repudiation?

Hashing

12
New cards

How is a digital signature created?

Encrypting the hash with a private key

13
New cards

What part of AAA is responsible for tracking logins and resource usage?

Accounting

14
New cards

Which of the following is used to authenticate devices in a network securely?

Certificate

15
New cards

Why is an authorization model used?

To simplify access management

16
New cards

What does a gap analysis identify?

The difference between current and desired security posture

17
New cards

Which of the following is a formal standard used in gap analysis?

ISO/IEC 27001

18
New cards

What is the final step in a gap analysis?

Write the formal report

19
New cards

What is the primary principle behind Zero Trust security?

Nothing is trusted by default

20
New cards

Which component evaluates access decisions in a Zero Trust architecture?

Policy Engine

21
New cards

What role does the Policy Enforcement Point (PEP) play?

Grants or denies access based on policy

22
New cards

What is the purpose of using security zones in Zero Trust?

Define trusted and untrusted boundaries

23
New cards

What is the function of a bollard?

Block vehicle access

24
New cards

What type of sensor detects motion using reflected ultrasonic waves?

Ultrasonic sensor

25
New cards

Which physical security control replaces or supports guards with automated visual monitoring?

CCTV

26
New cards

What is the purpose of an access control vestibule?

Prevent unauthorized multi-person entry

27
New cards

What is the purpose of a honeypot?

Attract and analyze attacker behavior

28
New cards

What are honeyfiles typically used for?

Trap attackers accessing fake documents

29
New cards

What makes a honeytoken useful in threat tracking?

It alerts when accessed

30
New cards

What is the first step in a typical change management approval process?

Complete a change request

31
New cards

Who is responsible for overseeing a change but not performing it?

Owner

32
New cards

Whats the purpose of an impact analysis in change management?

Assess the risks and effects of a change

33
New cards

What does a backout plan ensure?

Allows a return to original state after failure

34
New cards

What is an allow list used for?

Permit only approved applications

35
New cards

Which activity would be considered a restricted action without proper scope?

Updating an unrelated system during a change

36
New cards

Why is sandbox testing used before a major change?

It simulates real-world deployment safely