Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Security+ Exam 2026

Actual Preparation Beats Generic Memorization

We have coached hundreds of candidates through this cybersecurity milestone. The ones who struggle are almost always those who relied on low-quality, static brain dumps that fail to simulate the actual exam environment. At Exact2Pass, we have focused our ecosystem entirely on the underlying technical rationale. Our CompTIA Security+ SY0-701 exam prep includes rigorous engineering explanations for every single query, ensuring you comprehend the "why" behind the answer. We deep-dive into complex threat actor vectors, identity governance frameworks, and real-world cryptographic implementations. It is the definitive difference between blindly hoping for a pass and knowing you possess the practical expertise to handle whatever performance-based questions (PBQs) the Pearson VUE terminal presents to you.

Question # 151

Which of the following metrics impacts the backup schedule as part of the BIA?

A.

RTO

B.

RPO

C.

MTTR

D.

MTBF

Question # 152

A security engineer needs to quickly identify a signature from a known malicious file. Which of the following analysis methods would the security engineer most likely use?

A.

Static

B.

Sandbox

C.

Network traffic

D.

Package monitoring

Question # 153

An IT manager is putting together a documented plan describing how the organization will keep operating in the event of a global incident. Which of the following plans is the IT manager creating?

A.

Business continuity

B.

Physical security

C.

Change management

D.

Disaster recovery

Question # 154

A company relies on open-source software libraries to build the software used by its customers. Which of the following vulnerability types would be the most difficult to remediate due to the company ' s reliance on open-source libraries?

A.

Buffer overflow

B.

SQL injection

C.

Cross-site scripting

D.

Zero day

Question # 155

A company decides to purchase an insurance policy. Which of the following risk management strategies is this company implementing?

A.

Mitigate

B.

Accept

C.

Avoid

D.

Transfer

Question # 156

Which of the following risk management strategies should an enterprise adopt first if a legacy application is critical to business operations and there are preventative controls that are not yet implemented?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Question # 157

An attorney prints confidential documents to a copier in an office space near multiple workstations and a reception desk. When the attorney goes to the copier to retrieve the documents, the documents are missing. Which of the following would best prevent this from reoccurring?

A.

Place the copier in the legal department.

B.

Configure DLP on the attorney ' s workstation.

C.

Set up LDAP authentication on the printer.

D.

Conduct a physical penetration test.

Question # 158

Which of the following actions must an organization take to comply with a person ' s request for the right to be forgotten?

A.

Purge all personally identifiable attributes.

B.

Encrypt all of the data.

C.

Remove all of the person’s data.

D.

Obfuscate all of the person’s data.

Question # 159

A company is in the process of cutting jobs to manage costs. The Chief Information Security Officer is concerned about the increased risk of an insider threat. Which of the following will most likely help the security awareness team address this potential threat?

A.

Immediately disable the accounts of staff who are likely to be terminated.

B.

Train supervisors to identify and manage disgruntled employees.

C.

Configure DLP to monitor staff who will be terminated.

D.

Raise awareness for business leaders on social engineering techniques.

Question # 160

A company plans to secure its systems by:

Preventing users from sending sensitive data over corporate email

Restricting access to potentially harmful websites

Which of the following features should the company set up? (Select two).

A.

DLP software

B.

DNS filtering

C.

File integrity monitoring

D.

Stateful firewall

E.

Guardralls

F.

Antivirus signatures

Question # 161

A store is setting up wireless access for employees. Management wants to limit the number of access points while ensuring full coverage. Which tool will help determine how many access points are needed?

A.

Signal locator

B.

WPA3

C.

Heat map

D.

Site survey

Question # 162

Which of the following best describe why a process would require a two-person integrity security control?

A.

To Increase the chance that the activity will be completed in half of the time the process would take only one user to complete

B.

To permit two users from another department to observe the activity that is being performed by an authorized user

C.

To reduce the risk that the procedures are performed incorrectly or by an unauthorized user

D.

To allow one person to perform the activity while being recorded on the CCTV camera

Question # 163

A company is aware of a given security risk related to a specific market segment. The business chooses not to accept responsibility and target their services to a different market segment. Which of the following describes this risk management strategy?

A.

Exemption

B.

Exception

C.

Avoid

D.

Transfer

Question # 164

A certificate authority needs to post information about expired certificates. Which of the following would accomplish this task?

A.

TPM

B.

CRL

C.

PKI

D.

CSR

Question # 165

A security analyst sees the following entries in web server logs:

200.17.88.121 [05/May/2025:01:05:18 -0200] " GET /aboutus.htm " 200 3344

200.17.88.121 [05/May/2025:01:08:22 -0200] " GET /corporateOrg.htm " 200 4200

132.18.62.144 [05/May/2025:01:08:23 -0200] " GET /../../vhosts " 403 502

200.17.88.121 [05/May/2025:01:10:33 -0200] " POST /ContactUs.asp " 403 512

118.19.200.55 [05/May/2025:01:10:45 -0200] " POST/search " 200 1212 " SELECT * FROM company WHERE keyword = ' VP

105.86.13.11 [05/May/2025:01:15:45 -0200] " GET /latestContracts.htm " 404 512

Which of the following IP addresses is most likely involved in a malicious attempt?

A.

105.86.13.11

B.

118.19.200.55

C.

132.18.62.144

D.

200.17.88.121

Go to page: