Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SY0-701 Exam Dumps - CompTIA Security+ Exam 2025

Go to page:
Question # 57

Which of the following would a security administrator use to comply with a secure baseline during a patch update?

A.

Information security policy

B.

Service-level expectations

C.

Standard operating procedure

D.

Test result report

Full Access
Question # 58

A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?

A.

Data masking

B.

Encryption

C.

Geolocation policy

D.

Data sovereignty regulation

Full Access
Question # 59

A security engineer is installing an IPS to block signature-based attacks in the environment. Which of the following modes will best accomplish this task?

A.

Monitor

B.

Sensor

C.

Audit

D.

Active

Full Access
Question # 60

A company must ensure sensitive data at rest is rendered unreadable. Which of the following will the company most likely use?

A.

Hashing

B.

Tokenization

C.

Encryption

D.

Segmentation

Full Access
Question # 61

A company recently decided to allow employees to work remotely. The company wants to protect us data without using a VPN. Which of the following technologies should the company Implement?

A.

Secure web gateway

B.

Virtual private cloud end point

C.

Deep packet Inspection

D.

Next-gene ration firewall

Full Access
Question # 62

During a recent company safety stand-down, the cyber-awareness team gave a presentation on the importance of cyber hygiene. One topic the team covered was best practices for printing centers. Which of the following describes an attack method that relates to printing centers?

A.

Whaling

B.

Credential harvesting

C.

Prepending

D.

Dumpster diving

Full Access
Question # 63

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?

A.

Local data protection regulations

B.

Risks from hackers residing in other countries

C.

Impacts to existing contractual obligations

D.

Time zone differences in log correlation

Full Access
Question # 64

A legal department must maintain a backup from all devices that have been shredded and recycled by a third party. Which of the following best describes this requirement?

A.

Data retention

B.

Certification

C.

Sanitation

D.

Destruction

Full Access
Go to page: