SY0-701 Practice Quiz

This quiz contains sample non-copyrighted questions. Select an answer for each question, then press "Submit" to see your score, correct answers, and explanations.

1. Which principle ensures that users are given only the permissions they need to perform their job?



Answer: C. The principle of least privilege limits user access to the minimum necessary to perform their role, reducing the attack surface and potential for misuse.
2. What is the primary purpose of a firewall in a network?




Answer: B. A firewall enforces security policies by allowing, blocking, or logging network traffic according to configured rules, protecting internal networks from unauthorized access.
3. Which algorithm type is commonly used to verify data integrity by producing a fixed-size string from input data?




Answer: A. Hash functions map arbitrary-sized data to fixed-size hashes, enabling integrity checks; even small input changes produce different hashes.
4. Which of the following is an example of multi-factor authentication?




Answer: D. Multi-factor authentication requires at least two different factor types (knowledge, possession, inherence). A password (knowledge) plus a one-time code (possession) qualifies.
5. What is social engineering?




Answer: B. Social engineering attacks exploit human psychology to trick people into revealing sensitive data or performing actions that compromise security.
6. Which security control would you use to detect and alert on suspicious activity within a network?




Answer: A. An IDS analyzes network traffic or host activity to detect patterns of suspicious or malicious behavior and can generate alerts for security teams.
7. What does the principle of defense in depth advocate?




Answer: C. Defense in depth uses multiple overlapping security measures so that if one control fails, others still protect assets.
8. Which of the following best describes phishing?




Answer: B. Phishing involves deceptive messages that trick users into revealing sensitive information or performing unsafe actions.
9. What is the main goal of encryption?




Answer: A. Encryption transforms readable data into ciphertext to prevent unauthorized parties from reading it without the proper decryption key.
10. Which practice reduces risk from outdated software?




Answer: D. Regularly applying patches and updates addresses known vulnerabilities and reduces the attack surface from outdated software.
Score: 0 / 10