comptia sy0-701 practice test

CompTIA Security+

Last exam update: Nov 23 ,2025
Page 1 out of 30. Viewing questions 1-10 out of 300

Question 1

An organization is struggling with scaling issues on its VPN concentrator and internet circuit due to remote work. The organization is looking for a software solution that will allow it to reduce traffic on the VPN and internet circuit, while still providing encrypted tunnel access to the data center and monitoring of remote employee internet traffic. Which of the following will help achieve these objectives?

  • A. Deploying a SASE solution to remote employees Most Votes
  • B. Building a load-balanced VPN solution with redundant internet
  • C. Purchasing a low-cost SD-WAN solution for VPN traffic
  • D. Using a cloud provider to create additional VPN concentrators
Mark Question:
Answer:

A

User Votes:
A 14 votes
50%
B 3 votes
50%
C 3 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?

  • A. SSO
  • B. LEAP
  • C. MFA
  • D. PEAP
Mark Question:
Answer:

A

User Votes:
A 3 votes
50%
B 3 votes
50%
C 3 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organizations network. Which of the following fulfills this request?

  • A. access-list inbound deny ip source 0.0.0.0/0 destination 10.1.4.9/32
  • B. access-list inbound deny ip source 10.1.4.9/32 destination 0.0.0.0/0 Most Votes
  • C. access-list inbound permit ip source 10.1.4.9/32 destination 0.0.0.0/0
  • D. access-list inbound permit ip source 0.0.0.0/0 destination 10.1.4.9/32
Mark Question:
Answer:

B

User Votes:
A 2 votes
50%
B 14 votes
50%
C 3 votes
50%
D 3 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

To improve the security at a data center, a security administrator implements a CCTV system and posts several signs about the possibility of being filmed. Which of the following best describe these types of controls? (Choose two.)

  • A. Preventive
  • B. Deterrent
  • C. Corrective
  • D. Directive
  • E. Compensating
  • F. Detective
Mark Question:
Answer:

BF

User Votes:
A 2 votes
50%
B 1 votes
50%
C 1 votes
50%
D 1 votes
50%
E 3 votes
50%
F 1 votes
50%
Discussions
vote your answer:
A
B
C
D
E
F
0 / 1000

Question 5

A security administrator is working to secure company data on corporate laptops in case the laptops are stolen. Which of the following solutions should the administrator consider?

  • A. Disk encryption
  • B. Data loss prevention
  • C. Operating system hardening
  • D. Boot security
Mark Question:
Answer:

A

User Votes:
A 3 votes
50%
B 2 votes
50%
C 1 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following is the best resource to consult for information on the most common application exploitation methods?

  • A. OWASP
  • B. STIX
  • C. OVAL
  • D. Threat intelligence feed
  • E. Common Vulnerabilities and Exposures
Mark Question:
Answer:

A

User Votes:
A 1 votes
50%
B 1 votes
50%
C 1 votes
50%
D 3 votes
50%
E 1 votes
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?

  • A. Hacktivist
  • B. Whistleblower
  • C. Organized crime Most Votes
  • D. Unskilled attacker
Mark Question:
Answer:

C

User Votes:
A 3 votes
50%
B 3 votes
50%
C 11 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?

  • A. Packet captures
  • B. Vulnerability scans
  • C. Metadata
  • D. Dashboard Most Votes
Mark Question:
Answer:

D

User Votes:
A 3 votes
50%
B 2 votes
50%
C 2 votes
50%
D 12 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

A systems administrator is working on a solution with the following requirements:
Provide a secure zone.
Enforce a company-wide access control policy.
Reduce the scope of threats.
Which of the following is the systems administrator setting up?

  • A. Zero Trust Most Votes
  • B. AAA
  • C. Non-repudiation
  • D. CIA
Mark Question:
Answer:

A

User Votes:
A 12 votes
50%
B 1 votes
50%
C 1 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following describes effective change management procedures?

  • A. Approving the change after a successful deployment
  • B. Having a backout plan when a patch fails Most Votes
  • C. Using a spreadsheet for tracking changes
  • D. Using an automatic change control bypass for security updates
Mark Question:
Answer:

B

User Votes:
A 1 votes
50%
B 11 votes
50%
C 2 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2