SECURITY+ SY0-701 Comptia Security+ SY0-701 10 EXAM QUESTIONS FREE CLICK HERE TO BUY 300 EXAM QUESTIONS FOR SY0-701 1. An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario? Real-time recovery Hot Cold Warm None 2. A business received a small grant to migrate its infrastructure to an off-premises solution. Which of the following should be considered first? Cost of implementation Security of architecture Ability of engineers Security of cloud providers None 3. An organization wants a third-party vendor to do a penetration test that targets a specific device. The organization has provided basic information about the device. Which of the following best describes this kind of penetration test? Known environment Partially known environment Unknown environment Integrated None 4. Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified? Automation Compliance checklist Attestation Manual audit None 5. Which of the following is the most common data loss path for an air-gapped network? Bastion host Unsecured Bluetooth Unpatched OS Removable devices None 6. During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process? Analysis Lessons learned Detection Containment None 7. An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up? Hardening Employee monitoring Configuration enforcement Least privilege None 8. Which of the following can best protect against an employee inadvertently installing malware on a company system? Host-based firewall System isolation Least privilege Application allow list None 9. Which of the following is used to validate a certificate when it is presented to a user OCSP CSR CA CRC None 10. Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities? Encrypted Intellectual property Critical Data in transit None 1 out of 2 Time's up 96