CompTIA SY0-701 Free Practice Questions — Page 2

CompTIA Security+ • 5 questions • Answers & explanations included

Question 6

Which of the following scenarios describes a possible business email compromise attack?

A. An employee receives a gift card request in an email that has an executive’s name in the display field of the email.
B. Employees who open an email attachment receive messages demanding payment in order to access files.
C. A service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account.
D. An employee receives an email with a link to a phishing site that is designed to look like the company’s email portal.
Show Answer & Explanation

Correct Answer: A. An employee receives a gift card request in an email that has an executive’s name in the display field of the email.

Business Email Compromise (BEC) involves impersonating an executive to manipulate employees financially. Option A shows a spoofed executive display name requesting gift cards — a classic BEC pattern. Option B describes ransomware. Option C is a credential phishing attempt. Option D is standard phishing. BEC specifically targets financial action through executive impersonation.

Question 7

A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?

A. Jump server
B. RADIUS
C. HSM
D. Load balancer
Show Answer & Explanation

Correct Answer: A. Jump server

A jump server (bastion host) is an intermediary that allows admins to securely access systems in restricted segments. RADIUS handles authentication, not network segmentation access. HSM manages cryptographic keys. A load balancer distributes traffic, not administrative access. The jump server is specifically designed for this network isolation use case.

Question 8

An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?

A. NGFW
B. WAF
C. TLS
D. SD-WAN
Show Answer & Explanation

Correct Answer: B. WAF

A Web Application Firewall (WAF) inspects HTTP traffic and blocks attacks like buffer overflows targeting web apps. NGFW filters network traffic but lacks deep web application inspection. TLS encrypts traffic but doesn't block exploits. SD-WAN manages network routing, not attack prevention. WAF is purpose-built for protecting web applications.

Question 9

An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users’ passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?

A. Multifactor authentication
B. Permissions assignment
C. Access management
D. Password complexity
Show Answer & Explanation

Correct Answer: A. Multifactor authentication

The attack is credential compromise — passwords alone were bypassed. MFA requires a second factor (token, biometric), stopping attackers even with valid passwords. Password complexity only makes passwords harder to guess, not stolen ones useless. Permissions and access management don't prevent login with stolen credentials. MFA is the direct control against this type of account takeover.

Question 10

An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)

A. Typosquatting
B. Phishing
C. Impersonation
D. Vishing
E. Smishing
F. Misinformation
Show Answer & Explanation

Correct Answer: C. Impersonation

Smishing is phishing via SMS/text message — the delivery method here. Impersonation is used because the attacker pretended to be the payroll department. Phishing (B) refers to email-based attacks specifically. Vishing is voice/phone call-based. Typosquatting involves fake URLs. Misinformation is spreading false information, not credential theft.

Ready for the Full SY0-701 Experience?

Access all 120 pages of practice questions and simulate the real exam with timed mode.

Start Interactive Quiz →