0% found this document useful (0 votes)
61 views3 pages

CompTIA Security+ SY0-701 45 Practice Exam

The document is a practice exam for the CompTIA Security+ SY0-701 certification, consisting of 45 questions covering various topics in cybersecurity. Key areas include types of attacks, security controls, encryption methods, and best practices for network security. It serves as a study aid for individuals preparing for the Security+ certification exam.

Uploaded by

Aysu Bendaliyeva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views3 pages

CompTIA Security+ SY0-701 45 Practice Exam

The document is a practice exam for the CompTIA Security+ SY0-701 certification, consisting of 45 questions covering various topics in cybersecurity. Key areas include types of attacks, security controls, encryption methods, and best practices for network security. It serves as a study aid for individuals preparing for the Security+ certification exam.

Uploaded by

Aysu Bendaliyeva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CompTIA Security+ SY0-701 45 Question Practice Exam

1. Which of the following is an example of a Layer 7 attack?

2. What is the primary purpose of a SIEM solution in a security architecture?

3. Which security control best mitigates the risk of social engineering attacks?

4. What encryption method is commonly used to secure email communication?

5. Which of the following is a best practice when implementing multi-factor authentication?

6. What is the main function of a firewall in a network security architecture?

7. Which type of malware encrypts files and demands payment for decryption?

8. What is a primary security risk associated with Bring Your Own Device (BYOD) policies?

9. Which of the following is an example of a security control at the physical layer?

10. What type of attack exploits a weakness in a web application to inject malicious SQL queries?

11. Which protocol is used to securely transfer files over a network?

12. What is the primary goal of penetration testing?

13. Which security model focuses on ensuring data confidentiality?

14. What is the function of an Intrusion Detection System (IDS)?

15. What is the best method to secure wireless networks against unauthorized access?

16. Which of the following is an example of a technical control?

17. Which of these threats involves an attacker impersonating a legitimate user?

18. What is the primary purpose of a VPN in an enterprise network?

19. Which of the following describes the concept of least privilege?

20. What type of attack is often used to overwhelm a system with traffic?

21. Which tool would be most useful for detecting a brute-force attack?
22. What security control prevents unauthorized access to physical areas?

23. What type of malware disguises itself as a legitimate program?

24. Which protocol is used for encrypted communication over the web?

25. What is the purpose of the principle of separation of duties?

26. Which of the following would be an example of a risk management strategy?

27. Which of the following is a key component of an effective incident response plan?

28. What is a typical use case for an endpoint detection and response (EDR) system?

29. What is the first step in securing a network?

30. What is the primary purpose of patch management?

31. Which of the following tools is used for network traffic analysis?

32. What is the concept of defense in depth?

33. Which of the following is a commonly used technique for social engineering attacks?

34. What is the primary role of a DMZ in a network architecture?

35. What is an example of a disaster recovery plan (DRP) test?

36. Which of the following is a responsibility of a security administrator?

37. What is the purpose of a data loss prevention (DLP) system?

38. What is the most important factor when implementing multi-factor authentication?

39. Which of the following is an example of a vulnerability scanning tool?

40. What is a common defense mechanism against cross-site scripting (XSS) attacks?

41. What is the primary objective of an audit trail?

42. What is the first step in the risk assessment process?

43. What type of encryption algorithm uses the same key for both encryption and decryption?
44. Which of the following would be considered a physical security control?

45. What is the most effective method to prevent insider threats?

You might also like