Security+ 701 Sample Questions
Security+ 701 Sample Questions
Security+ 701 Sample Questions
A. Rootkit
B. Ransomware
C. Spyware
D. Bloatware
Question 2
During a security incident, the security operations team identified sustained network traffic from a malicious IP address:
10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization's
network. Which of the following fulfills this request?
Question 3
Which of the following threat actors is the most likely to use common hacking tools found on the internet to attempt to
remotely compromise an organization's web server?
A. Organized crime
B. Insider threat
C. Unskilled attacker
D. Nation-state
Question 4
A systems administrator would like to set up a system that will make it difficult or impossible to deny that someone has
performed an action. Which of the following is the administrator trying to accomplish?
A. Non-repudiation
B. Adaptive identity
C. Security zones
D. Deception and disruption
Question 5
Which of the following types of controls decreases the likelihood of a cybersecurity breach occurring?
A. Corrective
B. Transfer
C. Detective
D. Preventive
Question 6
A company is expanding its threat surface program and allowing individuals to security test the company's internet-
facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the
following best describes the program the company is setting up? Privacy - Terms
https://www.comptia.org/training/resources/practice-tests/security-701-practice-questions 1/3
12/30/24, 5:51 PM Security+ 701 Practice Questions | Sample Questions | Training | CompTIA
A. Open-source intelligence
B. Bug bounty
C. Red team
D. Penetration testing
Question 7
Which of the following is the final step of the incident response process?
A. Containment
B. Lessons learned
C. Eradication
D. Detection
Question 8
Which of the following provides the details about the terms of a test with a third-party penetration tester?
A. Rules of engagement
B. Supply chain analysis
C. Right to audit clause
D. Due diligence
Question 9
An organization is leveraging a VPN between its headquarters and a branch location. Which of the following is the VPN
protecting?
A. Data in use
B. Data in transit
C. Geographic restrictions
D. Data sovereignty
Question 10
Which of the following would be the most helpful in restoring data in the event of a ransomware infection?
A. Load balancing
B. Geographic dispersion
C. Encryption
D. Backups
Question 4) A. Non-repudiation
Question 5) D. Preventive
https://www.comptia.org/training/resources/practice-tests/security-701-practice-questions 2/3