DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. CompTIA
  3. CompTIA Security+ Certification Exam
  4. CompTIA.SY0-701.v2025-07-29.q260
  5. Question 1

Join the discussion

Question 1/260

Which of the following Is a common, passive reconnaissance technique employed by penetration testers in the early phases of an engagement?

Correct Answer: B

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (260q)
Q1. Which of the following Is a common, passive reconnaissance technique employed by penetrati...
Q2. During the onboarding process, an employee needs to create a password for an intranet acco...
Q3. Which of the following can be used to identify potential attacker activities without affec...
Q4. An analyst is evaluating the implementation of Zero Trust principles within the data plane...
Q5. A systems administrator is auditing all company servers to ensure. They meet the minimum s...
Q6. Which of the following data protection strategies can be used to confirm file integrity?...
Q7. You are security administrator investigating a potential infection on a network. Click on ...
Q8. Which of the following is the most effective way to protect an application server running ...
Q9. An IT administrator needs to ensure data retention standards are implemented on an enterpr...
Q10. Which of the following must be considered when designing a high-availability network? (Cho...
Q11. A business received a small grant to migrate its infrastructure to an off-premises solutio...
Q12. A legal department must maintain a backup from all devices that have been shredded and rec...
Q13. A security engineer configured a remote access VPN. The remote access VPN allows end users...
Q14. A systems administrator creates a script that validates OS version, patch levels, and inst...
Q15. An accountant is transferring information to a bank over FTP. Which of the following mitig...
Q16. A security administrator is addressing an issue with a legacy system that communicates dat...
Q17. Which of the following is best used to detect fraud by assigning employees to different ro...
Q18. Which of the following phases of an incident response involves generating reports?...
Q19. Which of the following describes a security alerting and monitoring tool that collects sys...
Q20. Which of the following would be the greatest concern for a company that is aware of the co...
Q21. An IT manager is putting together a documented plan describing how the organization will k...
Q22. Which of the following security concepts is being followed when implementing a product tha...
Q23. A program manager wants to ensure contract employees can only use the company's computers ...
Q24. A company recently decided to allow employees to work remotely. The company wants to prote...
Q25. Which of the following best represents an application that does not have an on-premises re...
Q26. Which of the following should be used to aggregate log data in order to create alerts and ...
Q27. An organization recently updated its security policy to include the following statement: R...
Q28. Which of the following is the final step of the modem response process?...
Q29. Which of the following is a compensating control for providing user access to a high-risk ...
Q30. A customer of a large company receives a phone call from someone claiming to work for the ...
Q31. Several employees received a fraudulent text message from someone claiming to be the Chief...
Q32. A company's website is www. Company. com Attackers purchased the domain wwww. company.com ...
Q33. A systems administrator discovers a system that is no longer receiving support from the ve...
Q34. A security analyst and the management team are reviewing the organizational performance of...
Q35. Which of the following alert types is the most likely to be ignored over time?...
Q36. Which of the following would best explain why a security analyst is running daily vulnerab...
Q37. A company is redesigning its infrastructure and wants to reduce the number of physical ser...
Q38. An engineer moved to another team and is unable to access the new team's shared folders wh...
Q39. Which of the following would be the best ways to ensure only authorized personnel can acce...
Q40. Which of the following best describe a penetration test that resembles an actual external ...
Q41. Which of the following would be best suited for constantly changing environments?...
Q42. A penetration test identifies that an SMBvl Is enabled on multiple servers across an organ...
Q43. While a user reviews their email, a host gets infected by malware from an external hard dr...
Q44. A security analyst receives alerts about an internal system sending a large amount of unus...
Q45. The security operations center is researching an event concerning a suspicious IP address ...
Q46. A company is utilizing an offshore team to help support the finance department. The compan...
Q47. A security administrator needs a method to secure data in an environment that includes som...
Q48. A company relies on open-source software libraries to build the software used by its custo...
Q49. An organization is evaluating new regulatory requirements associated with the implementati...
Q50. Which of the following is the most likely outcome if a large bank fails an internal PCI DS...
Q51. Which of the following is die most important security concern when using legacy systems to...
Q52. Which of the following is the most likely to be used to document risks, responsible partie...
Q53. A company is developing a business continuity strategy and needs to determine how many sta...
Q54. A company is aware of a given security risk related to a specific market segment. The busi...
Q55. A network administrator wants to ensure that network traffic is highly secure while in tra...
Q56. An organization experiences a cybersecurity incident involving a command-and-control serve...
Q57. Which of the following tasks is typically included in the BIA process?...
Q58. A security analyst reviews domain activity logs and notices the following: (Exhibit) Which...
Q59. An administrator assists the legal and compliance team with ensuring information about cus...
Q60. Which of the following exercises should an organization use to improve its incident respon...
Q61. A security engineer is working to address the growing risks that shadow IT services are in...
Q62. The Chief Information Security Officer of an organization needs to ensure recovery from ra...
Q63. A company plans to secure its systems by: Preventing users from sending sensitive data ove...
Q64. Which of the following would be the best way to test resiliency in the event of a primary ...
Q65. Which of the following security concepts is the best reason for permissions on a human res...
Q66. A user is attempting to patch a critical system, but the patch fails to transfer. Which of...
Q67. After creating a contract for IT contractors, the human resources department changed sever...
Q68. Which of the following control types is AUP an example of?...
Q69. A company implemented an MDM policy 10 mitigate risks after repealed instances of employee...
Q70. A security analyst is prioritizing vulnerability scan results using a risk-based approach....
Q71. A company requires hard drives to be securely wiped before sending decommissioned systems ...
Q72. A software developer would like to ensure. The source code cannot be reverse engineered or...
Q73. An employee receives a text message that appears to have been sent by the payroll departme...
Q74. A cybersecurity incident response team at a large company receives notification that malwa...
Q75. A company is working with a vendor to perform a penetration test Which of the following in...
Q76. A systems administrator is working on a solution with the following requirements: * Provid...
Q77. Which of the following is a reason why a forensic specialist would create a plan to preser...
Q78. A company identified the potential for malicious insiders to harm the organization. Which ...
Q79. During an investigation, an incident response team attempts to understand the source of an...
Q80. An IT manager informs the entire help desk staff that only the IT manager and the help des...
Q81. A company is discarding a classified storage array and hires an outside vendor to complete...
Q82. An employee clicks a malicious link in an email that appears to be from the company's Chie...
Q83. An organization plans to expand its operations internationally and needs to keep data at t...
Q84. Which of the following is most likely associated with introducing vulnerabilities on a cor...
Q85. A company is considering an expansion of access controls for an application that contracto...
Q86. The Chief Information Officer (CIO) asked a vendor to provide documentation detailing the ...
Q87. Which of the following explains why an attacker cannot easily decrypt passwords using a ra...
Q88. Which of the following is a feature of a next-generation SIEM system?...
Q89. A security engineer would like to enhance the use of automation and orchestration within t...
Q90. A malicious update was distributed to a common software platform and disabled services at ...
Q91. A systems administrator receives a text message from an unknown number claiming to be the ...
Q92. A security administrator is reissuing a former employee's laptop. Which of the following i...
Q93. A company wants to track modifications to the code used to build new virtual servers. Whic...
Q94. A company wants to ensure employees are allowed to copy files from a virtual desktop durin...
Q95. Which of the following are the best for hardening end-user devices? (Selecttwo)...
Q96. A company prevented direct access from the database administrators' workstations to the ne...
Q97. The Chief Information Security Officer (CISO) at a large company would like to gain an und...
Q98. A systems administrator is redesigning now devices will perform network authentication. Th...
Q99. Malware spread across a company's network after an employee visited a compromised industry...
Q100. An employee in the accounting department receives an email containing a demand for payment...
Q101. A new vulnerability enables a type of malware that allows the unauthorized movement of dat...
Q102. A security officer is implementing a security awareness program and is placing security-th...
Q103. Which of the following is the first step to secure a newly deployed server?...
Q104. An organization would like to calculate the time needed to resolve a hardware issue with a...
Q105. Which of the following is the best way to consistently determine on a daily basis whether ...
Q106. A newly identified network access vulnerability has been found in the OS of legacy loT dev...
Q107. Which of the following allows an exploit to go undetected by the operating system?...
Q108. Which of the following is the best way to provide secure remote access for employees while...
Q109. An organization is adopting cloud services at a rapid pace and now has multiple SaaS appli...
Q110. An important patch for a critical application has just been released, and a systems admini...
Q111. While considering the organization's cloud-adoption strategy, the Chief Information Securi...
Q112. The management team notices that new accounts that are set up manually do not always have ...
Q113. Which of the following describes the reason root cause analysis should be conducted as par...
Q114. Which of the following is the best way to secure an on-site data center against intrusion ...
Q115. An administrator wants to automate an account permissions update for a large number of acc...
Q116. Which of the following is a common data removal option for companies that want to wipe sen...
Q117. Which of the following security control types does an acceptable use policy best represent...
Q118. A security report shows that during a two-week test period. 80% of employees unwittingly d...
Q119. After reviewing the following vulnerability scanning report: Server:192.168.14.6 Service: ...
Q120. Which of the following must be considered when designing a high-availability network? (Sel...
Q121. Which of the following most accurately describes the order in which a security engineer sh...
Q122. A healthcare organization wants to provide a web application that allows individuals to di...
Q123. Visitors to a secured facility are required to check in with a photo ID and enter the faci...
Q124. Which of the following vulnerabilities is exploited when an attacker overwrites a register...
Q125. Which of the following is prevented by proper data sanitization?...
Q126. Which of the following architectures is most suitable to provide redundancy for critical b...
Q127. A systems administrator receives an alert that a company's internal file server is very sl...
Q128. An analyst is reviewing an incident in which a user clicked on a link in a phishing email....
Q129. Which of the following describes the process of concealing code or text inside a graphical...
Q130. Which of the following is a possible consequence of a VM escape?...
Q131. Which of the following is a preventive physical security control?...
Q132. An enterprise is trying to limit outbound DNS traffic originating from its internal networ...
Q133. A penetration tester begins an engagement by performing port and service scans against the...
Q134. An organization would like to store customer data on a separate part of the network that i...
Q135. A security team is reviewing the findings in a report that was delivered after a third par...
Q136. Which of the following security concepts is accomplished with the installation of a RADIUS...
Q137. Which of the following actors attacking an organization is the most likely to be motivated...
Q138. Which of the following would enable a data center to remain operational through a multiday...
Q139. A company has begun labeling all laptops with asset inventory stickers and associating the...
Q140. Which of the following would a systems administrator follow when upgrading the firmware of...
Q141. Which of the following should a security operations center use to improve its incident res...
Q142. An organization is looking to optimize its environment and reduce the number of patches ne...
Q143. A business uses Wi-Fi with content filleting enabled. An employee noticed a coworker acces...
Q144. Which of the following is the most relevant reason a DPO would develop a data inventory?...
Q145. In a rush to meet an end-of-year business goal, the IT department was told to implement a ...
Q146. A new security regulation was announced that will take effect in the coming year. A compan...
Q147. A systems administrator notices that the research and development department is not using ...
Q148. An organization is developing a security program that conveys the responsibilities associa...
Q149. A Chief Information Security Officer (CISO) wants to explicitly raise awareness about the ...
Q150. A software developer wishes to implement an application security technique that will provi...
Q151. Which of the following teams combines both offensive and defensive testing techniques to p...
Q152. A U.S.-based cloud-hosting provider wants to expand its data centers to new international ...
Q153. An organization recently started hosting a new service that customers access through a web...
Q154. Two companies are in the process of merging. The companies need to decide how to standardi...
Q155. An administrator has configured a quarantine subnet for all guest devices that connect to ...
Q156. Users at a company are reporting they are unable to access the URL for a new retail websit...
Q157. Which of the following has been implemented when a host-based firewall on a legacy Linux s...
Q158. Which of the following cryptographic solutions protects data at rest?...
Q159. Which of the following provides the details about the terms of a test with a third-party p...
Q160. One of a company's vendors sent an analyst a security bulletin that recommends a BIOS upda...
Q161. A network manager wants to protect the company's VPN by implementing multifactor authentic...
Q162. Which of the following types of identification methods can be performed on a deployed appl...
Q163. A company is required to use certified hardware when building networks. Which of the follo...
Q164. A data administrator is configuring authentication for a SaaS application and would like t...
Q165. Which of the following actions could a security engineer take to ensure workstations and s...
Q166. Which of the following data states applies to data that is being actively processed by a d...
Q167. A company wants to reduce the time and expense associated with code deployment. Which of t...
Q168. A company has a website in a server cluster. One server is experiencing very high usage, w...
Q169. An attacker posing as the Chief Executive Officer calls an employee and instructs the empl...
Q170. Which of the following is an algorithm performed to verify that data has not been modified...
Q171. Which of the following describes the category of data that is most impacted when it is los...
Q172. Which of the following security concepts is accomplished when granting access after an ind...
Q173. A company discovered its data was advertised for sale on the dark web. During the initial ...
Q174. Which of the following allows a systems administrator to tune permissions for a file?...
Q175. Which of the following threat actors is the most likely to be hired by a foreign governmen...
Q176. A certificate authority needs to post information about expired certificates. Which of the...
Q177. When trying to access an internal website, an employee reports that a prompt displays, sta...
Q178. Which of the following organizational documents is most often used to establish and commun...
Q179. For which of the following reasons would a systems administrator leverage a 3DES hash from...
Q180. The security team at a large global company needs to reduce the cost of storing data used ...
Q181. A company's Chief Information Security Officer (CISO) wants to enhance the capabilities of...
Q182. A security consultant needs secure, remote access to a client environment. Which of the fo...
Q183. Which of the following would be the most appropriate way to protect data in transit?...
Q184. After an audit, an administrator discovers all users have access to confidential data on a...
Q185. A spoofed identity was detected for a digital certificate. Which of the following are the ...
Q186. Which of the following definitions best describes the concept of log co-relation?...
Q187. The marketing department set up its own project management software without telling the ap...
Q188. An organization implemented cloud-managed IP cameras to monitor building entry points and ...
Q189. A systems administrator is creating a script that would save time and prevent human error ...
Q190. Which of the following is a common source of unintentional corporate credential leakage in...
Q191. A recent penetration test identified that an attacker could flood the MAC address table of...
Q192. An employee emailed a new systems administrator a malicious web link and convinced the adm...
Q193. An organization has too many variations of a single operating system and needs to standard...
Q194. Various stakeholders are meeting to discuss their hypothetical roles and responsibilities ...
Q195. Which of the following topics would most likely be included within an organization's SDLC?...
Q196. A security engineer is implementing FDE for all laptops in an organization. Which of the f...
Q197. An administrator is installing an SSL certificate on a new system. During testing, errors ...
Q198. Which of the following security measures is required when using a cloud-based platform for...
Q199. A systems administrator is changing the password policy within an enterprise environment a...
Q200. A bank set up a new server that contains customers' Pll. Which of the following should the...
Q201. The local administrator account for a company's VPN appliance was unexpectedly used to log...
Q202. Which of the following describes the maximum allowance of accepted risk?...
Q203. A company hired a consultant to perform an offensive security assessment covering penetrat...
Q204. Which of the following agreements defines response time, escalation, and performance metri...
Q205. An organization needs to monitor its users' activities to prevent insider threats. Which o...
Q206. Which of the following is used to add extra complexity before using a one-way data transfo...
Q207. Which of the following can best protect against an employee inadvertently installing malwa...
Q208. A website user is locked out of an account after clicking an email link and visiting a dif...
Q209. After a recent ransomware attack on a company's system, an administrator reviewed the log ...
Q210. A company with a high-availability website is looking to harden its controls at any cost. ...
Q211. A company's legal department drafted sensitive documents in a SaaS application and wants t...
Q212. Security controls in a data center are being reviewed to ensure data is properly protected...
Q213. Which of the following cryptographic methods is preferred for securing communications with...
Q214. Which of the following can be used to compromise a system that is running an RTOS?...
Q215. An organization disabled unneeded services and placed a firewall in front of a business-cr...
Q216. Which of the following describes an executive team that is meeting in a board room and tes...
Q217. A company needs to provide administrative access to internal resources while minimizing th...
Q218. An administrator discovers that some files on a database server were recently encrypted. T...
Q219. A company plans to secure its systems by: Preventing users from sending sensitive data ove...
Q220. Which of the following best describe why a process would require a two-person integrity se...
Q221. During a penetration test, a vendor attempts to enter an unauthorized area using an access...
Q222. A legacy device is being decommissioned and is no longer receiving updates or patches. Whi...
Q223. Which of the following is required for an organization to properly manage its restore proc...
Q224. Which of the following actions best addresses a vulnerability found on a company's web ser...
Q225. A company is concerned about weather events causing damage to the server room and downtime...
Q226. During a recent company safety stand-down, the cyber-awareness team gave a presentation on...
Q227. An employee clicked a malicious link in an email and downloaded malware onto the company's...
Q228. Which of the following should a security team do first before a new web server goes live?...
Q229. The help desk receives multiple calls that machines with an outdated OS version are runnin...
Q230. Which of the following steps in the risk management process involves establishing the scop...
Q231. A security analyst scans a company's public network and discovers a host is running a remo...
Q232. Which of the following factors are the most important to address when formulating a traini...
Q233. Which of the following is the primary purpose of a service that tracks log-ins and time sp...
Q234. A company has yearly engagements with a service provider. The general terms and conditions...
Q235. A security administrator is deploying a DLP solution to prevent the exfiltration of sensit...
Q236. An administrator was notified that a user logged in remotely after hours and copied large ...
Q237. Which of the following activities uses OSINT?
Q238. A company must ensure sensitive data at rest is rendered unreadable. Which of the followin...
Q239. During a security incident, the security operations team identified sustained network traf...
Q240. An administrator must replace an expired SSL certificate. Which of the following does the ...
Q241. Which of the following strategies should an organization use to efficiently manage and ana...
Q242. A company is changing its mobile device policy. The company has the following requirements...
Q243. A security analyst receives an alert that there was an attempt to download known malware. ...
Q244. Which of the following involves an attempt to take advantage of database misconfigurations...
Q245. An administrator notices that several users are logging in from suspicious IP addresses. A...
Q246. An employee used a company's billing system to issue fraudulent checks. The administrator ...
Q247. A security administrator observed the following in a web server log while investigating an...
Q248. Which of the following activities should a systems administrator perform to quarantine a p...
Q249. Which of the following is the most likely to be included as an element of communication in...
Q250. A database administrator is updating the company's SQL database, which stores credit card ...
Q251. An organization is building a new backup data center with cost-benefit as the primary requ...
Q252. A client demands at least 99.99% uptime from a service provider's hosted security services...
Q253. A systems administrator works for a local hospital and needs to ensure patient data is pro...
Q254. Executives at a company are concerned about employees accessing systems and information ab...
Q255. Which of the following is a hardware-specific vulnerability?...
Q256. A security analyst is assessing several company firewalls. Which of the following cools wo...
Q257. A security analyst needs to propose a remediation plan 'or each item in a risk register. T...
Q258. Which of the following agreement types defines the time frame in which a vendor needs to r...
Q259. Which of the following is the stage in an investigation when forensic images are obtained?...
Q260. After a recent vulnerability scan, a security engineer needs to harden the routers within ...
[×]

Download PDF File

Enter your email address to download CompTIA.SY0-701.v2025-07-29.q260.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.