Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 97

Which of the following would most likely be used by attackers to perform credential harvesting?

A.

Social engineering

B.

Supply chain compromise

C.

Third-party software

D.

Rainbow table

Full Access
Question # 98

Which of the following involves an attempt to take advantage of database misconfigurations?

A.

Buffer overflow

B.

SQL injection

C.

VM escape

D.

Memory injection

Full Access
Question # 99

Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?

A.

Fines

B.

Audit findings

C.

Sanctions

D.

Reputation damage

Full Access
Question # 100

A security analyst is reviewing logs and discovers the following:

Which of the following should be used lo best mitigate this type of attack?

A.

Input sanitization

B.

Secure cookies

C.

Static code analysis

D.

Sandboxing

Full Access
Question # 101

A growing company would like to enhance the ability of its security operations center to detect threats but reduce the amount of manual work required tor the security analysts. Which of the following would best enable the reduction in manual work?

A.

SOAR

B.

SIEM

C.

MDM

D.

DLP

Full Access
Question # 102

Which of the following topics would most likely be included within an organization's SDLC?

A.

Service-level agreements

B.

Information security policy

C.

Penetration testing methodology

D.

Branch protection requirements

Full Access
Question # 103

A newly identified network access vulnerability has been found in the OS of legacy loT devices. Which of the following would best mitigate this vulnerability quickly?

A.

Insurance

B.

Patching

C.

Segmentation

D.

Replacement

Full Access
Question # 104

An engineer has ensured that the switches are using the latest OS, the servers have the latest patches, and the endpoints' definitions are up to date. Which of the following will these actions most effectively prevent?

A.

Zero-day attacks

B.

Insider threats

C.

End-of-life support

D.

Known exploits

Full Access
Go to page: