CompTIA SY0-701 Practice Test

Prepare smarter and boost your chances of success with our CompTIA SY0-701 Practice test. This test helps you assess your knowledge, pinpoint strengths, and target areas for improvement. Surveys and user data from multiple platforms show that individuals who use SY0-701 practice exam are 40–50% more likely to pass on their first attempt.

Start practicing today and take the fast track to becoming CompTIA SY0-701 certified.

17150 already prepared
Updated On : 11-Sep-2025
715 Questions
4.8/5.0

Page 9 out of 72 Pages

A security analyst is assessing several company firewalls. Which of the following cools would The analyst most likely use to generate custom packets to use during the assessment?

A. hping

B. Wireshark

C. PowerShell

D. netstat

A.   hping

Explanation:

A) hping is the correct answer.
hping is a command-line network tool used to generate and manipulate custom TCP/IP packets. It is specifically designed for:

Firewall testing:
Sending crafted packets to test firewall rules and responses.

Network probing:
Assessing how networks and devices handle unusual or malicious packet structures.

Custom packet generation:
Creating packets with specified headers, flags, payloads, etc., to simulate various types of traffic or attacks.

This makes it ideal for a security analyst assessing firewall behavior.

Why the others are incorrect:

B) Wireshark:
This is a network protocol analyzer (packet sniffer) used for capturing and inspecting network traffic. It is excellent for analysis but cannot generate custom packets.

C) PowerShell:
While PowerShell has cmdlets for network testing (e.g., Test-NetConnection), it lacks the fine-grained control needed to generate custom packets like hping.

D) netstat:
This tool displays network connections, routing tables, and interface statistics. It is used for monitoring and diagnostics but cannot generate packets.

Reference:
This question tests knowledge of Domain 4.1: Given a scenario, analyze indicators of malicious activity and Domain 4.2: Explain the security implications of proper hardware, software, and data asset management. Tools like hping are essential for proactive security assessments, including firewall testing, as covered in the SY0-701 objectives.

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

A. Bollards

B. Access badge

C. Motion sensor

D. Video surveillance

B.   Access badge

Explanation: To secure an on-site data center against intrusion from an insider, the best measure is to use an access badge system. Access badges control who can enter restricted areas by verifying their identity and permissions, thereby preventing unauthorized access from insiders.
Access badge: Provides controlled and monitored access to restricted areas, ensuring that only authorized personnel can enter.
Bollards: Provide physical barriers to prevent vehicle access but do not prevent unauthorized personnel entry.
Motion sensor: Detects movement but does not control or restrict access.
Video surveillance: Monitors and records activity but does not physically prevent intrusion.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 1.2 - Summarize fundamental security concepts (Physical security controls).

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

A. Memory injection

B. Race condition

C. Side loading

D. SQL injection

A.   Memory injection

Explanation: Memory injection vulnerabilities allow unauthorized code or commands to be executed within a software program, leading to abnormal behavior such as generating outbound traffic over random high ports. This issue often arises from software not properly validating or encoding input, which can be exploited by attackers to inject malicious code. References: CompTIA Security+ SY0-701 course content and official CompTIA study resources.

Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?

A. Risk tolerance

B. Risk transfer

C. Risk register

D. Risk analysis

C.   Risk register

Explanation:

C) Risk register is the correct answer.
A risk register is a documented repository that tracks and details all identified risks within an organization. It typically includes:

Risks:
Descriptions of potential events or threats.

Responsible parties:
Owners assigned to manage or mitigate each risk.

Thresholds:
Risk appetite or tolerance levels (e.g., acceptable levels of impact or likelihood).

Additional details such as risk scores, mitigation strategies, and status updates.

This tool is essential for ongoing risk management and ensures accountability and transparency.

Why the others are incorrect:

A) Risk tolerance:
This refers to the level of risk an organization is willing to accept. It is a policy or guideline (often documented in the risk register) but not the comprehensive document itself.

B) Risk transfer:
This is a risk treatment strategy (e.g., purchasing insurance) where risk is shifted to a third party. It is an action taken for specific risks, not a documentation tool.

D) Risk analysis:
This is the process of identifying, assessing, and prioritizing risks. The output of risk analysis is often recorded in a risk register, but the analysis itself is not the document.

Reference:
This question tests knowledge of Domain 5.1: Explain the importance of risk management processes. The risk register is a foundational component of risk management frameworks (e.g., NIST RMF, ISO 27005), serving as a living document to track risks and responses over time.

Which of the following would best explain why a security analyst is running daily vulnerability scans on all corporate endpoints?

A. To track the status of patching installations

B. To find shadow IT cloud deployments

C. To continuously the monitor hardware inventory

D. To hunt for active attackers in the network

A.   To track the status of patching installations

Explanation:
Daily vulnerability scans on all corporate endpoints are primarily conducted to track the status of patch installations. Vulnerability scanners identify missing patches, misconfigurations, and known vulnerabilities on systems. By running these scans daily, the security analyst can:

Verify that patches have been successfully applied after deployment.

Identify systems that are still vulnerable due to failed or pending patches.

Maintain an up-to-date view of the organization's security posture and compliance with patch management policies.

This proactive approach ensures that vulnerabilities are promptly addressed and reduces the window of exposure to threats.

Analysis of Incorrect Options:

B. To find shadow IT cloud deployments:
Vulnerability scans focus on known systems and endpoints within the corporate inventory. They are not designed to discover unauthorized cloud services or shadow IT, which require specialized cloud security tools (e.g., CASB) or network traffic analysis.

C. To continuously monitor hardware inventory:
While vulnerability scans might incidentally detect devices, their primary purpose is not inventory management. Dedicated asset management tools or network discovery scans are better suited for tracking hardware inventory.

D. To hunt for active attackers in the network:
Vulnerability scans assess system weaknesses but do not detect active attackers or malicious activity. Threat hunting involves analyzing logs, network traffic, and endpoints for indicators of compromise (IOCs), which is beyond the scope of vulnerability scanning.

Reference:
This aligns with Domain 2.0: Threats, Vulnerabilities, and Mitigations, specifically vulnerability management processes. Daily scans are a best practice for continuous monitoring and patch verification, as recommended in frameworks like NIST SP 800-40 (Guide to Enterprise Patch Management) and the CIS Critical Security Controls (e.g., Control 7: Continuous Vulnerability Management).

Which of the following data roles is responsible for identifying risks and appropriate access to data?

A. Owner

B. Custodian

C. Steward

D. Controller

A.   Owner

Explanation: The data owner is the role responsible for identifying risks to data and determining who should have access to that data. The owner has the authority to make decisions about the protection and usage of the data, including setting access controls and ensuring that appropriate security measures are in place.
References = CompTIA Security+ SY0-701 study materials, particularly in the domain of data governance and the roles and responsibilities associated with data management.

Which of the following is classified as high availability in a cloud environment?

A. Access broker

B. Cloud HSM

C. WAF

D. Load balancer

D.   Load balancer

Explanation: In a cloud environment, high availability is typically ensured through the use of a load balancer. A load balancer distributes network or application traffic across multiple servers, ensuring that no single server becomes overwhelmed and that services remain available even if one or more servers fail. This setup enhances the reliability and availability of applications. Load balancer: Ensures high availability by distributing traffic across multiple servers or instances, preventing overload and ensuring continuous availability. Access broker: Typically refers to a service that facilitates secure access to resources, not directly related to high availability. Cloud HSM (Hardware Security Module): Provides secure key management in the cloud but does not specifically ensure high availability.
WAF (Web Application Firewall): Protects web applications by filtering and monitoring HTTP traffic but is not primarily focused on ensuring high availability.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 4.4 - Security operations (Load balancing for high availability).

A security analyst is investigating an alert that was produced by endpoint protection software. The analyst determines this event was a false positive triggered by an employee who attempted to download a file. Which of the following is the most likely reason the download was blocked?

A. A misconfiguration in the endpoint protection software

B. A zero-day vulnerability in the file

C. A supply chain attack on the endpoint protection vendor

D. Incorrect file permissions

A.   A misconfiguration in the endpoint protection software

Explanation: The most likely reason the download was blocked, resulting in a false positive, is a misconfiguration in the endpoint protection software. False positives occur when legitimate actions are incorrectly identified as threats due to incorrect settings or overly aggressive rules in the security software.
Misconfiguration in the endpoint protection software: Common cause of false positives, where legitimate activities are flagged incorrectly due to improper settings.
Zero-day vulnerability: Refers to previously unknown vulnerabilities, which are less likely to be associated with a false positive.
Supply chain attack: Involves compromising the software supply chain, which is a broader and more severe issue than a simple download being blocked.
Incorrect file permissions: Would prevent access to files but not typically cause an alert in endpoint protection software.
Reference: CompTIA Security+ SY0-701 Exam Objectives, Domain 4.3 - Explain various activities associated with vulnerability management (False positives).

Several employees received a fraudulent text message from someone claiming to be the Chief Executive Officer (CEO). The message stated:
ā€œI’m in an airport right now with no access to email. I need you to buy gift cards for employee recognition awards. Please send the gift cards to following email address.ā€
Which of the following are the best responses to this situation? (Choose two).

A. Cancel current employee recognition gift cards.

B. Add a smishing exercise to the annual company training.

C. Issue a general email warning to the company.

D. Have the CEO change phone numbers.

E. Conduct a forensic investigation on the CEO's phone.

F. Implement mobile device management.

B.   Add a smishing exercise to the annual company training.
C.   Issue a general email warning to the company.

Explanation:
This is a clear example of a smishing attack (SMS phishing). The best responses are those that immediately mitigate the threat and improve long-term resilience through training.

Why B is Correct:
The attack was successful because employees were not prepared for this specific social engineering tactic. Adding a simulated smishing exercise to security awareness training will proactively educate employees on how to identify and report such fraudulent messages, reducing the likelihood of future success. This addresses the root cause: human vulnerability.

Why C is Correct:
An immediate general email warning is a crucial incident response step. It quickly informs all employees of the ongoing smishing campaign, explains the specifics of the fraudulent message, and instructs them to delete the message and report it if received. This contains the incident and prevents further employees from falling victim to the same scam.

Why the Other Options Are Incorrect:

A. Cancel current employee recognition gift cards:
This is unnecessary. The message was a fraud; there is no indication that legitimate, existing gift card programs were compromised. This response does not address the phishing attempt.

D. Have the CEO change phone numbers:
This is an overreaction. The CEO's phone number was likely spoofed, not actually compromised. Changing a number is highly disruptive and ineffective against spoofing, as the attacker can just spoof the new number.

E. Conduct a forensic investigation on the CEO's phone:
There is no evidence the CEO's phone was compromised. The attack was conducted via SMS spoofing, where the sender's number is faked. An investigation of the CEO's device would be a misallocation of resources based on the available information.

F. Implement mobile device management (MDM):
While MDM is a good general security practice for enforcing policies on company-owned devices, it would not have prevented this specific attack. The attack targeted human behavior via a personal or company-owned phone's messaging app, which is generally outside the control of MDM to block without being overly restrictive.

Reference:
This question falls under Domain 1.0: Threats, Attacks, and Vulnerabilities (identifying smishing) and Domain 4.0: Operations and Incident Response (executing the appropriate immediate and long-term responses to a security incident). The correct answers represent both immediate containment (warning) and long-term prevention (training).

A website user is locked out of an account after clicking an email link and visiting a different website Web server logs show the user's password was changed, even though the user did not change the password. Which of the following is the most likely cause?

A. Cross-sue request forgery

B. Directory traversal

C. ARP poisoning

D. SQL injection

A.   Cross-sue request forgery

Explanation:
The scenario describes a user who is tricked into performing an action on a website where they are already authenticated, without their knowledge or consent.

A. Cross-site request forgery (CSRF or XSRF) is correct.
This attack works by tricking a logged-in user's browser into sending an unauthorized command to a website. Here's how it fits:

The user is likely already logged into their account on the vulnerable website.

They click a link in a malicious email, which takes them to a different, attacker-controlled website.

This attacker-controlled website contains a hidden form or script that automatically submits a request to the legitimate website's "change password" function.

Because the user's browser is still authenticated with the legitimate site (it sends the session cookie automatically), the website processes this forged request as if it were intentional and changes the password, locking the user out.

B. Directory traversal is incorrect.
This attack aims to access files and directories that are stored outside the web root folder (e.g., ../../etc/passwd). It is used for unauthorized file access, not for forging authenticated requests to change passwords.

C. ARP poisoning is incorrect.
This is a network-level attack where an attacker sends falsified ARP messages to link their MAC address with the IP address of a legitimate network device. It is used for man-in-the-middle attacks to intercept data, not specifically to forge web application requests like a password change.

D. SQL injection is incorrect.
This attack involves inserting malicious SQL code into input fields to manipulate a backend database. It could be used to steal passwords from a database but is not the typical method for changing a password by tricking an authenticated user's browser into making a request. A password change form vulnerable to CSRF might also be vulnerable to SQLi, but the described mechanism (clicking an email link) is the hallmark of CSRF.

Reference:
CompTIA Security+ SY0-701 Objective 1.3: "Given a scenario, analyze potential indicators associated with application attacks." Cross-site request forgery (CSRF) is a listed application attack where unauthorized commands are transmitted from a user that the web application trusts.

Page 9 out of 72 Pages
SY0-701 Practice Test Previous