Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 49

Which of the following actions must an organization take to comply with a person's request for the right to be forgotten?

A.

Purge all personally identifiable attributes.

B.

Encrypt all of the data.

C.

Remove all of the person’s data.

D.

Obfuscate all of the person’s data.

Full Access
Question # 50

Which of the following are cases in which an engineer should recommend the decommissioning of a network device? (Select two).

A.

The device has been moved from a production environment to a test environment.

B.

The device is configured to use cleartext passwords.

C.

The device is moved to an isolated segment on the enterprise network.

D.

The device is moved to a different location in the enterprise.

E.

The device's encryption level cannot meet organizational standards.

F.

The device is unable to receive authorized updates.

Full Access
Question # 51

A security engineer at a large company needs to enhance IAM to ensure that employees can only access corporate systems during their shifts. Which of the following access controls should the security engineer implement?

A.

Role-based

B.

Time-of-day restrictions

C.

Least privilege

D.

Biometric authentication

Full Access
Question # 52

Which of the following is an example of a data protection strategy that uses tokenization?

A.

Encrypting databases containing sensitive data

B.

Replacing sensitive data with surrogate values

C.

Removing sensitive data from production systems

D.

Hashing sensitive data in critical systems

Full Access
Question # 53

Which of the following would enable a data center to remain operational through a multiday power outage?

A.

Generator

B.

Uninterruptible power supply

C.

Replication

D.

Parallel processing

Full Access
Question # 54

A security administrator is reissuing a former employee's laptop. Which of the following is the best combination of data handling activities for the administrator to perform? (Select two).

A.

Data retention

B.

Certification

C.

Tokenization

D.

Classification

E.

Sanitization

F.

Enumeration

Full Access
Question # 55

A company is implementing a vendor's security tool in the cloud. The security director does not want to manage users and passwords specific to this tool but would rather utilize the company's standard user directory. Which of the following should the company implement?

A.

802.1X

B.

SAML

C.

RADIUS

D.

CHAP

Full Access
Question # 56

A security analyst receives an alert from a corporate endpoint used by employees to issue visitor badges. The alert contains the following details:

Which of the following best describes the indicator that triggered the alert?

A.

Blocked content

B.

Brute-force attack

C.

Concurrent session usage

D.

Account lockout

Full Access
Go to page: