SY0-701 CompTIA Security+ Practice Questions

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/102

flashcard set

Earn XP

Description and Tags

from Codecademy course and Exam Compass

Last updated 12:40 AM on 5/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

103 Terms

1
New cards

Which security control enforces the inability of a subject to deny that they participated in a digital transaction, agreement, contract, or communication such as an email?

a. Non-repudiation

b. Confidentiality

c. Availability

d. Integrity

a. Non-repudiation

2
New cards

Which security goal controls an attacker's ability to get unauthorized access to data or information from an application or system?

a. Availability

b. Non-repudiation

c. Confidentiality

d. Integrity

c. Confidentiality

3
New cards

What is the process of granting an authenticated entity permission to access a resource or perform a specific function?

a. Authorization

b. Availability

c. Authentication

d. Accounting

a. Authorization

4
New cards

What is one way to enable authentication of non-traditional network endpoints such as smart card readers, HVAC systems, medical equipment, and IP-enabled door locks?

a. Endpoint fingerprinting

b. Packet mode

c. Protected access files

d. Repudiation

a. Endpoint fingerprinting

5
New cards

What is a strict mathematical model where access to resources is determined by the system based on predefined security labels and rules?

a. ABAC

b. DAC

c. RBAC

d. MAC

d. MAC

6
New cards

Which category of controls supports ongoing maintenance, due care, and continual improvement such as conducting tested patch management?

a. Managerial

b. Operational

c. Physical

d. Technical

b. Operational

7
New cards

Which type of security control is made up of mandatory policies and regulations that are in place to maintain consistency and compliance?

a. Preventative

b. Corrective

c. Directive

d. Deterrent

c. Directive

8
New cards

Which of these are common ways to authenticate people?

Choose all options that best answer the question.

a. A password, PIN, or passphrase they know

b. A smart card token or fob that they possess

c. An X.509 device certificate

d. A QR or other code they present on a device

e. A network interface MAC address

f. A biometric attribute

a. A password, PIN, or passphrase they know

b. A smart card token or fob that they possess

d. A QR or other code they present on a device

f. A biometric attribute

9
New cards

What is a comprehensive appraisal that helps organizations determine the difference between the current state of their information security to specific industry requirements guidance and best practices?

a. Gap analysis

b. External audit

c. Security controls assessment

d. Vulnerability assessment

a. Gap analysis

10
New cards

Which are preventative physical security controls?

Choose all options that best answer the question.

a. Fences

b. Signage

c. Gates

d. Mantraps

e. Bollards

f. IDS

a. Fences

b. Signage

c. Gates

d. Mantraps

e. Bollards

11
New cards

Which initiative consists of planned and unplanned downtime (e.g., an outage) and must be considered with technical change management when making modifications or performing migrations?

a. Resiliency

b. Durability

c. Capacity

d. Availability

d. Availability

12
New cards

What is a system (e.g., a web server) or resource that is designed to be attractive to potential attackers and intruders?

a. Honeynet

b. Honeypot

c. Honey file

d. Honey token

b. Honeypot

13
New cards

What is the term for an evolving set of cybersecurity initiatives that move defenses from static, network-based perimeters to focus on users, assets, and resources?

a. Zero trust

b. Trust but verify

c. Transitive trust

d. Zero-day malware

a. Zero trust

14
New cards

What is the methodical approach to handling the transition or modification of an organization's goals, processes, or technologies?

a. Configuration management

b. Change management

c. Problem management

d. Incident management

b. Change management

15
New cards

What is a set of data, tools, utilities, and processes used to support configuration management?

a. CMDB

b. CSP

c. CMS

d. ITSM

c. CMS

16
New cards

What is defined by explicit trust zones, such as data centers, DMZs, and the public Internet?

a. Zero Trust management plane

b. Zero Trust control plane

c. Zero Trust service plane

d. Zero Trust data plane

d. Zero Trust data plane

17
New cards

Which lightning systems are designed for reserve or on-hold use or to supplement permanent systems?

a. Continuous lighting

b. Stand-by lighting

c. Moveable lighting hardware

d. Emergency lighting

b. Stand-by lighting

18
New cards

Samuel was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?

a. Web server buffer and host DNS server

b. Reply referrer and domain buffer

c. Host table and external DNS server

d. Web browser and browser add-on

c. Host table and external DNS server

19
New cards

What is the difference between a DoS and a DDoS attack?

a. DoS attacks do not use DNS servers as DDoS attacks do.

b. DoS attacks use fewer computers than DDoS attacks.

c. DoS attacks use more memory than DDoS attacks

d. DoS attacks are faster than DDoS attacks.

b. DoS attacks use fewer computers than DDoS attacks.

20
New cards

Which utility sends custom TCP/IP packets?

a. cURL

b. hping

c. shape

d pingpacket

b. hping

21
New cards

Which of the following is a third-party OS penetration testing tool?

a. theHarvester

b. scanless

c. sn1per

d. Nessus

c. sn1per

22
New cards

Margret wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?

a. head

b. show

c. display

d. cat

d. cat

23
New cards

A company purchased cyber insurance to address items listed on the risk register.

Which of the following strategies does this represent?

a. Accept

b. Transfer

c. Mitigate

d. Avoid

b. Transfer

24
New cards

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

a. Risk tolerance

b. Risk transfer

c. Risk register

d. Risk analysis

c. Risk register

25
New cards

A systems administrator notices that the research and development department is not using the company VPN when accessing various company-related services and systems.

Which of the following scenarios describes this activity?

a. Espionage

b. Data exfiltration

c. Nation-state attack

d. Shadow IT

d. Shadow IT

26
New cards

Which of the following threat vectors is most commonly utilized by insider threat actors attempting data exfiltration?

a. Unidentified removable devices

b. Default network device credentials

c. Spear phishing emails

d. Impersonation of business units through typosquatting

a. Unidentified removable devices

27
New cards

Which of the following agreement types defines the time frame in which a vendor needs to respond?

a. SOW

b. SLA

c. MOA

d. MOU

b. SLA

28
New cards

Which of the following is a feature of a next-generation SIEM system?

a. Virus signatures

b. Automated response actions

c. Security agent deployment

d. Vulnerability scanning

b. Automated response actions

29
New cards

To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed.

Which of the following best describe these types of controls? (Choose two.)

a. Preventive

b. Deterrent

c. Corrective

d. Directive

e. Compensating

f. Detective

b. Deterrent

f. Detective

30
New cards

Which type of encryption involves the process of encoding all user data on a solid-state drive?

a. Full disk encryption

b. File encryption

c. Volume encryption

d. Partition encryption

a. Full disk encryption

31
New cards

Alice wants to send Bob a message with origin authentication. Which scenario would apply?

a. The message will be encrypted with Bob’s public key then decrypted with Bob’s private key

b. The message will be encrypted with Alice’s private key then decrypted with Alice’s public key

c. The message will be encrypted with Alice’s public key then decrypted with Alice’s private key

d. The message will be encrypted with Bob’s private key then decrypted with Bob’s public key

b. The message will be encrypted with Alice’s private key then decrypted with Alice’s public key

32
New cards

What is often a separate chip on the motherboard (TPM 2.0) that allows manufacturers to build the capability into their chipsets rather than requiring a separate chip?

a. Full disk encryption

b. Key management service

c. Trusted platform module

d. Hardware security module

c. Trusted platform module

33
New cards

Which is a common symmetric key block cipher?

Choose all options that best answer the question.

a. RSA

b. 3DES-EDE

c. ECDSA

d. Blowfish

e. AES-GCM

f. AES-CBC

b. 3DES-EDE

d. Blowfish

e. AES-GCM

f. AES-CBC

34
New cards

What is a distributed database that leverages a constantly growing list of ordered records called blocks for asset transfer ledgers, cryptocurrencies, tokens, and smart contracts?

a. Blockchain

b. Steganography

c. Counter block chaining

d. Tokenization

a. Blockchain

35
New cards

Which is a scalable way to bind a public key with an entity identity and offer revocation services?

a. Hashed message authentication

b. Diffie-Hellman key exchange

c. Digital signing services

d. Public key infrastructure

d. Public key infrastructure

36
New cards

What is the technique of adding pseudorandom data to a cryptographic hash function to make it less deterministic for cracking tools?

a. Hashing

b. Collisions

c. Encryption

d. Salting

d. Salting

37
New cards

Which algorithm uses smaller key spaces while offering superior strength for mobile devices and IoT with limited memory and processing power?

a. SHA-384

b. Elliptic curve

c. RSA key exchange

d. Diffie-Helman key exchange

b. Elliptic curve

38
New cards

Which is a scalable mechanism for providing authenticity, integrity, and non-repudiation using random public/private key pairs?

a. Digital signature

b. HMAC

c. Diffie-Hellman

d. RSA

a. Digital signature

39
New cards

Which attack forces an end user to perform undesirable actions in a web application in which they are authenticated?

a. CSRF/XSRF

b. XSS

c. DDoS

d. SQLi

a. CSRF/XSRF

40
New cards

Which of these technologies contributes to unsecure removable drives?

a. USB

b. TPM

c. HDD

d. SSD

a. USB

41
New cards

Which document offers organizations with an up-to-date, expert-informed understanding of cloud security issues so that educated risk-management decisions can be made concerning cloud adoption strategies?

a. OWASP API Top Ten

b. ITIL4 Management Practices

c. CSA Treacherous 12

d. CIS Top 12

c. CSA Treacherous 12

42
New cards

What is a form of attack that targets companies who outsource, conduct wire transfers, and process invoices - often abroad?

a. Spoofing

b. BEC

c. DDoS

d. Pharming

b. BEC

43
New cards

Which type of attack involves sending a larger than expected input to a front-end web server that accepts it and overwrites memory areas?

a. Cross-site scripting

b. DLL injection

c. Buffer overflow

d. Race condition

c. Buffer overflow

44
New cards

What is the act of exploiting the flaws of a locked-down iPhone to install software other than what the manufacturer has made available for that device?

a. Sideloading

b. MDM

c. Rooting

d. Jailbreaking

d. Jailbreaking

45
New cards

Which term describes software that is embedded within hardware devices and provides low-level control and functionality?

a. Middleware

b. Firmware

c. Ghost IT

d. Shadow IT

b. Firmware

46
New cards

Which type of threat actor is responsible for attacks such as DDoS, ransomware, hijacking, and web site defacing to raise awareness or protest for a cause?

a. Hacktivist

b. Crime syndicate

c. Script kiddie

d. State-based

a. Hacktivist

47
New cards

Which are valid threat actor motivations?

Choose all options that best answer the question.

a. Revenge

b. Extortion

c. Political activism

d. Corporate goodwill

e. Financial gain

f. Borrowing costs

a. Revenge

b. Extortion

c. Political activism

e. Financial gain

48
New cards

What is a powerful countermeasure to supply chain vulnerabilities?

a. Trust but verify

b. Bidirectional trust

c. Transitive trust

d. Zero trust

d. Zero trust

49
New cards

Which is a type of brute force attack where the attacker slowly performs brute force logins based on a list of usernames with default passwords on the application?

a. Downgrade

b. Spraying

c. Spoofing

d. Brute force

b. Spraying

50
New cards

Which physical attack uses devices that overlay an ATM machine or point-of-sale scanner to steal the information from the victim?

a. Skimming

b. Spoofing

c. Brute force

d. RFID cloning

a. Skimming

51
New cards

Which of these would be considered an indicator of compromise?

Choose all options that best answer the question.

a. Concurrent session usage

b. Successful logins

c. Impossible travel

d. Blocked content

e. Logging to a SIEM system

f. High resource consumption

a. Concurrent session usage

c. Impossible travel

d. Blocked content

f. High resource consumption

52
New cards

Which type of attack leverages a scenario when two different inputs can produce the same fingerprint or digest?

a. Collision

b. Downgrade

c. Side channel

d. Brute force

a. Collision

53
New cards

Which common form of DDoS attack involves a network of zombie systems and a master command and control (C&C) server to remotely control the victims?

a. Extranet attack

b. Botnet attack

c. Cache Poisoning attack

d. Amplification attack

b. Botnet attack

54
New cards

Which popular form of malware encrypts key files and captures them until the victim pays the attackers in Bitcoin?

a. Bloatware

b. Spyware

c. Ransomware

d. Firmware

c. Ransomware

55
New cards

Which form of application attack changes a program’s execution path and overwrites elements of its memory, which amends the program’s execution path to damage existing files or expose data?

a. Directory traversal attack

b. Credential replay

c. Buffer overflow

d. Replay attacks

c. Buffer overflow

56
New cards

Which are terms that can be considered synonymous with segmentation?

Choose all options that best answer the question.

a. Zoning

b. Segregation

c. Partitioning

d. Isolation

e. Multicasting

f. Security grouping

a. Zoning

b. Segregation

c. Partitioning

d. Isolation

57
New cards

Which Linux command would one use to modify a file and directory permission?

a. touch

b. chmod

c. mkdir

d. sudo

b. chmod

58
New cards

Which practices contribute to system hardening?

Choose all options that best answer the question.

a. Utilizing password less solutions

b. Opening all TCP and UDP ports

c. Implementing forced vacations

d. Removing all unnecessary and unauthorized software

e. Disabling all auto-configure features

f. Replacing all default passwords with strong credentials

a. Utilizing password less solutions

d. Removing all unnecessary and unauthorized software

e. Disabling all auto-configure features

f. Replacing all default passwords with strong credentials

59
New cards

What is the principle that users and programs should only have the necessary privileges to complete their tasks?

a. Dual operator

b. Mediated access

c. Least privilege

d. Separation of duties

c. Least privilege

60
New cards

What is a common location to collect and send automated monitoring visibility and sending feeds?

a. Security operations center

b. Demilitarized zone

c. Proxy server

d. Firewall appliance

a. Security operations center

61
New cards

Which security practice involves monitoring for uncommon or even risky behavior of outgoing staff members?

a. Proofing

b. Decommissioning

c. Downgrading

d. Onboarding

b. Decommissioning

62
New cards

What is a set of data, tools, utilities, and processes used to support configuration management?

a. CMS

b. SQL

c. DNS

d. CSV

a. CMS

63
New cards

Which security service helps protect private information, sensitive data, and can enhance the security of communication between client apps and servers?

a. Hashing

b. Spraying

c. Encrypting

d. Spoofing

c. Encrypting

64
New cards

Which are valid examples of serverless technologies?

Choose all options that best answer the question.

a. Databases

b. Controllers

c. Bastion hosts

d. Switches

e. Containers

f. Functions

a. Databases

c. Bastion hosts

e. Containers

f. Functions

65
New cards

Which metric specifically refers to long-term data protection where the stored data does not suffer from bit rot, degradation, or other corruption?

a. Durability

b. Availability

c. Capacity

d. Resiliency

a. Durability

66
New cards

What is a discrete environment within an operating system (or a serverless architecture) where one or more applications can run that is typically assigned all the resources and dependencies needed to function?

a. Controllers

b. Partitions

c. Containers

d. Functions

c. Containers

67
New cards

In the cloud computing shared responsibility model (SRM) which service type does the provider bear the LEAST responsibility?

a. PaaS

b. SaaS

c. IaaS

d. DBaaS

c. IaaS

68
New cards

Which is a framework intended to make a network more flexible and easier to centrally manage by abstracting the control plane from the data forwarding function in the different networking devices?

a. GCP

b. SDN

c. CSP

d. AWS

b. SDN

69
New cards

In which type of network system does each node make its own decision and the final behavior of the system is the aggregate of the decisions of each individual node or host?

a. Decentralized design

b. Centralized design

c. Air gapped design

d. Software defined design

a. Decentralized design

70
New cards

Which are common examples of SCADA systems?

Choose all options that best answer the question.

a. Traffic and mass transit

b. Power grid

c. KVM datacenter systems

d. Fire detection and suppression

e. Water management

f. Facility and manufacturing control

a. Traffic and mass transit

b. Power grid

e. Water management

f. Facility and manufacturing control

71
New cards

Which type of hypervisor is also referred to as “native” or “bare metal”?

a. Type I

b. Type II

c. Type III

d. Type IV

a. Type I

72
New cards

Which term describes the provisioning and operations of infrastructure using configuration files that contain the infrastructure specifications instead of by manual processes?

a. Managed security service provision

b. Hybrid cloud deployment

c. Infrastructure-as-code

d. Platform-as-a-service

c. Infrastructure-as-code

73
New cards

Which acronym refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves?

a. IoT

b. SaaS

c. IaC

d. IaaS

a. IoT

74
New cards

What is the preferred security solution to support mobile devices, embedded components and IoT?

a. Elliptic curves

b. mutual TLS

c. Software defined networking

d. Electronic codebooks

a. Elliptic curves

75
New cards

Which IPsec protocol has two phases and two separate security associations?

a. IKEv1

b. ESP

c. IKEv2

d. AH

a. IKEv1

76
New cards

Which actions can an intrusion detection service perform?

Choose all options that best answer the question.

a. Verbose dumps

b. Alerts and alarms

c. Drop packets inline

d. SNMP traps

e. Block attacker address inline

f. TCP resets

a. Verbose dumps

b. Alerts and alarms

d. SNMP traps

f. TCP resets

77
New cards

Which service offers multiple security features and services on a single network device to protect email, webmail, fax, voice, conferencing, streaming, peer-to-peer file transfer services and more?

a. ACL

b. SDP

c. VPN

d. UTM

d. UTM

78
New cards

Which term describes all possible attack vectors that a threat actor can leverage to access a system and extract data?

a. Kill chain

b. Attack surface

c. Restricted zone

d. Indicator of compromise

b. Attack surface

79
New cards

What is an architecture that delivers converged network and security as a service capabilities such as secure web gateways, cloud access security brokers, firewall as-a-service, and zero-trust network access (ZTNA)?

a. SASE

b. SD-MAN

c. TLS

d. SMTP

a. SASE

80
New cards

What is the most ubiquitous certificate-based peer authentication in use on the Internet (HTTPS)?

a. TLS

b. SDN

c. IPsec

d. SSL

a. TLS

81
New cards

Which assigned port number is used for HTTPS?

a, 563

b. 465

c. 443

d. 990

c. 443

82
New cards

What is the most stringent privacy and security law in the world drafted and passed by the European Union (EU)?

a. HITECH

b. GLBA

c. GDPR

d. PCI-DSS

c. GDPR

83
New cards

Which type of data is temporarily in computer memory or Redis cache waiting to be read or updated?

a. Data at rest

b. Data in transit

c. Data in storage

d. Data in use

d. Data in use

84
New cards

Which algorithm is most commonly used to protect data at rest?

a. AES

b. DHKE

c. TLS

d. 3DES

a. AES

85
New cards

What is any representation of data that allows the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means?

a. Regulated data

b. Personal health information

c. Personally identifiable information

d. Intellectual property

c. Personally identifiable information

86
New cards

In which data lifecycle phase is data typically placed onto a volume (block), object (blob), file system, or into one of several types of databases?

a. Create

b. Share

c. Use

d. Store

d. Store

87
New cards

What is a process of dividing and organizing data and information into defined groups to enable handling, labeling, sorting, viewing, and securing?

a. Tokenization

b. Segmentation

c. Encryption

d. Compartmentalization

b. Segmentation

88
New cards

Which data obfuscation technique involves sending sensitive data through an API call (or batch file) to a system that replaces the data with non-sensitive, pseudorandom placeholders?

a. Obscuring

b. Encryption

c. Data mapping

d. Tokenization

d. Tokenization

89
New cards

Which type of corporate data classification applies to information limited to employees only and often has different security requirements that affect who can access it and how it can be used?

a. Confidential

b. Top secret

c. Internal

d. Public

c. Internal

90
New cards

Which technology, widely used in data center, manufacturing and cloud services industries, is a technique for analyzing how much production capacity organizations need to meet consumer demand?

a. Availability management

b. Tabletop planning

c. Capacity planning

d. Deployment planning

c. Capacity planning

91
New cards

Which business impact metric measures the average time needed to repair or replace a failed system or module?

a. MTBF

b. MAC

c. MTD

d. MTTR

d. MTTR

92
New cards

Which technology solution is designed to be a redundant set of service functionalities based on active-standby or active-active deployments of two or more components or systems?

a. Load balancing

b. Segmenting

c. Clustering

d. Target grouping

c. Clustering

93
New cards

What are planned power outages, usually implemented in areas with unstable grids or with infrastructure that cannot handle the population it serves?

a. Permanent faults

b. Brownouts

c. Rolling blackouts

d. Interruptible power

c. Rolling blackouts

94
New cards

Which disaster recovery testing solution involves completely shutting down operations at the primary site to completely emulate the disaster and use the recovery site solution?

a. Parallel test

b. Full interruption test

c. Walkthrough test

d. Simulation test

b. Full interruption test

95
New cards

Which of these disaster recovery site solutions is the cheapest and slowest option?

a. Reciprocal cold site

b. Warm site

c. Mobile site

d. Cloud site

a. Reciprocal cold site

96
New cards

Which type of backup is an immediate point-in-time virtual copy of the source data where the time to backup does not increase with amount of data?

a. Differential

b. Snapshot

c. Full

d. Incremental

b. Snapshot

97
New cards

Which stage of the asset management process often involves the ongoing enumeration and tracking of all physical and logical assets typically leveraging SIEM and SOAR systems?

a. Sanitization/certification

b. Retention/destruction

c. Monitoring/tracking

d. Acquisition/procurement

c. Monitoring/tracking

98
New cards

Which specific tool generates a color-coded graphical representation of different wireless metrics such as signal strength, signal-to-noise ratio levels (SNR), and interference in different areas?

a. Wireless access point

b. Wireless heat map

c. Wireless gateway

d. Wireless packet sniffer

b. Wireless heat map

99
New cards

Which application testing methodology is commonly defined as a clear-box or “know all” test, where an analysis of the application source code, byte code, and binaries is carried out by the application test without executing the code?

a. SAST

b. DAST

c. DQ

d. PQ

a. SAST

100
New cards

Which mobile device provisioning model will a company typically give the employees devices that are provisioned from vendors and cellular providers without end-user input that users can then handle as if they were their own?

a. CYOD

b. CMDB

c. COPE

d. BYOD

c. COPE