comptia sy0-701 practice test

Exam Title: comptia security+ 2023

Last update: Aug 05 ,2025
Question 1

A security analyst locates a potentially malicious video file on a server and needs to identify both the creation date and the files creator. Which of the following actions would most likely give the security analyst the information required?

  • A. Obtain the file's SHA-256 hash.
  • B. Use hexdump on the file's contents.
  • C. Check endpoint logs.
  • D. Query the file's metadata. Most Votes
Answer:

D

vote your answer:
A
B
C
D
A 2 B 4 C 4 D 18 votes
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is D

fakpovo
4 months ago

Query the file's metadata

2 months ago

I know it is D.

1 month, 1 week ago

Query the file's metadata.

Question 2

A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?

  • A. Memory injection Most Votes
  • B. Race condition
  • C. Side loading
  • D. SQL injection
Answer:

A

vote your answer:
A
B
C
D
A 17 votes B 5 C 4 D 4
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is D

fakpovo
4 months ago

Memory injection

2 months ago

The reason it is a memory injection since it is behaving abnormally. Think that and it is memory injection.

1 month, 1 week ago

Memory injection

Question 3

Which of the following most impacts an administrators ability to address CVEs discovered on a server?

  • A. Rescanning requirements
  • B. Patch availability Most Votes
  • C. Organizational impact
  • D. Risk tolerance
Answer:

B

vote your answer:
A
B
C
D
A 3 B 23 votes C 4 D 2
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is B

fakpovo
4 months ago

Patch availability

1 month, 1 week ago

Patch availability

Question 4

Which of the following is the best way to secure an on-site data center against intrusion from an insider?

  • A. Bollards
  • B. Access badge Most Votes
  • C. Motion sensor
  • D. Video surveillance
Answer:

B

vote your answer:
A
B
C
D
A 3 B 22 votes C 1 D 2
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is B

1 month, 1 week ago

Access badge

Question 5

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?

  • A. RDP server
  • B. Jump server Most Votes
  • C. Proxy server
  • D. Hypervisor
Answer:

B

vote your answer:
A
B
C
D
A 2 B 22 votes C 3 D 3
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is B

fakpovo
4 months ago

Hypervisor

1 month, 1 week ago

Jump server

Question 6

Which of the following is used to validate a certificate when it is presented to a user?

  • A. OCSP Most Votes
  • B. CSR
  • C. CA
  • D. CRC
Answer:

A

vote your answer:
A
B
C
D
A 20 votes B 7 C 16 votes D 1
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is A

fakpovo
4 months ago

Online Certificate Status Protocol

1 month, 1 week ago

validate a certificate CA

Question 7

A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. Which of the following attacks is the organization experiencing?

  • A. ARP poisoning
  • B. Brute force
  • C. Buffer overflow
  • D. DDoS Most Votes
Answer:

D

vote your answer:
A
B
C
D
A 3 B 4 C 3 D 12 votes
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is D

fakpovo
4 months ago

Distributed Denial of Service

1 month, 1 week ago

sudden increase in network traffic DDoS

Question 8

Which of the following methods would most likely be used to identify legacy systems?

  • A. Bug bounty program
  • B. Vulnerability scan Most Votes
  • C. Package monitoring
  • D. Dynamic analysis
Answer:

B

vote your answer:
A
B
C
D
A 1 B 13 votes C 5 D 1
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is B

fakpovo
4 months ago

Vulnerability Scan

1 month, 1 week ago

Vulnerability scan

Question 9

HOTSPOT -
You are a security administrator investigating a potential infection on a network.

INSTRUCTIONS -
Click on each host and firewall. Review all logs to determine which host originated the infection and then identify if each remaining host is clean or infected.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.












Answer:

Comments
Nonhlanhla
8 months, 3 weeks ago

infected, infected, original
infected, infected

[email protected] (replied to Nonhlanhla)
1 month, 1 week ago

Confused with the 2 answers.

4 months, 2 weeks ago

192.168.10.22- origin
192.168.10.37- clean
192.168.10.41- infected
10.10.9.12- clean
10.10.9.18- infected

2 months ago

192.168.10.22 - infected
192.168.10.37 - clean
192.168.10.41 - infected
10.10.9.12 - clean
10.10.9.18 - infected

By checking each of the servers and firewall you are able to see which one is infected and which one is cleaned.

Question 10

Which of the following describes an executive team that is meeting in a board room and testing the companys incident response plan?

  • A. Continuity of operations
  • B. Capacity planning
  • C. Tabletop exercise Most Votes
  • D. Parallel processing
Answer:

C

vote your answer:
A
B
C
D
A 5 B 2 C 14 votes D 1
Comments
Nonhlanhla
8 months, 3 weeks ago

Answer is C

2 months ago

Tabletop exercise

1 month, 1 week ago

Tabletop exercise

Page 1 out of 29
Viewing questions 1-10 out of 300
Go To
page 2