CompTIA Security+ SY0-701 Mock Exam
*Q&A* (100% Correct) 2025/2026
|VERIFIED|
What is the primary function of a firewall in network security?
To monitor and control incoming and outgoing network traffic based on security rules.
Which type of encryption method uses the same key for both ...
CompTIA Security+ SY0-701 Mock Exam
*Q&A* (100% Correct) 2025/2026
|VERIFIED|
What is the primary function of a firewall in network security?
To monitor and control incoming and outgoing network traffic based on security rules.
Which type of encryption method uses the same key for both encryption and decryption?
Symmetric encryption.
What is the purpose of a VPN (Virtual Private Network)?
To provide a secure connection over a public network by encrypting data.
What does multi-factor authentication (MFA) typically require?
Two or more verification factors, such as something you know, something you have, or something
you are.
What is a DDoS attack, and how does it affect a network?
A Distributed Denial of Service (DDoS) attack overwhelms a network or server with traffic, causing
a disruption in service.
What is the main difference between a virus and a worm?
A virus requires a host to replicate, while a worm can replicate itself independently.
What is the concept of least privilege in security?
Granting users only the access necessary to perform their job functions.
How can social engineering be used in a security attack?
1
, By manipulating individuals into revealing confidential information or performing actions that
compromise security.
What is the function of an IDS (Intrusion Detection System)?
To monitor network traffic for suspicious activity and raise alerts if potential threats are detected.
What type of attack is typically used to intercept and alter communication between two parties?
Man-in-the-middle (MITM) attack.
What is the purpose of a digital signature in secure communications?
To verify the authenticity of a message and ensure that it has not been altered.
What does hashing do to a password or file in terms of security?
It converts the data into a fixed-length string that is irreversible, providing a secure way to store
passwords.
What does the term "phishing" refer to in cybersecurity?
A type of social engineering attack where attackers impersonate legitimate entities to steal
sensitive information.
What is a zero-day vulnerability?
A flaw in software that is unknown to the vendor and has not been patched.
What are the characteristics of a strong password?
A strong password is long, includes a mix of characters (uppercase, lowercase, numbers, and
symbols), and does not include easily guessable information.
What is the function of a security information and event management (SIEM) system?
To collect, analyze, and report on security data and events from various sources to detect and
respond to potential threats.
2
, How does public-key infrastructure (PKI) support secure communications?
It uses pairs of cryptographic keys (public and private) to enable secure encryption and
authentication.
What is a key difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for both encryption and decryption, while asymmetric
encryption uses a public key for encryption and a private key for decryption.
What is the role of a certificate authority (CA) in PKI?
To issue and manage digital certificates that authenticate the identity of entities and enable
secure communication.
What type of control is a firewall considered in the context of security?
A preventive control that blocks unauthorized access to or from a network.
How can you secure a wireless network to prevent unauthorized access?
By using strong encryption (e.g., WPA3) and setting a unique, strong passphrase for the network.
What is the difference between a full backup and an incremental backup?
A full backup copies all data, while an incremental backup copies only the data that has changed
since the last backup.
What is the primary purpose of a vulnerability scanner?
To identify and assess potential security weaknesses in a system or network.
What is the function of an antivirus program?
To detect, quarantine, and remove malicious software from a system.
What does the term "data loss prevention" (DLP) refer to?
3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller StellarGrades. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £7.36. You're not tied to anything after your purchase.