CompTIA Security+ Practice Exam Part 2
Vložit
- čas přidán 3. 06. 2024
- In this video I go over Security+ practice questions based on the SYO-601 and SYO-701 exam objectives. You will see my thought process and walkthrough for each question so you can use it as a Security+ study guide. These questions are scenario based and formatted to be similar to the ones asked on the CompTIA Security+ exam. This is Part 2 of this series!
→ Protect your privacy and SAVE A TON with NordVPN! go.nordvpn.net/aff_c?offer_id...
Check out Part 1:
→. • CompTIA Security+ Prac...
CySA+ Practice Questions and Walkthrough
→ • CompTIA CySA+ Practice...
Want to pass the Security+ exam?
→ • HOW TO PASS SECURITY+ ...
☕️Support me by buying me a coffee → www.buymeacoffee.com/imcyberj...
CHAPTERS:
00:00 Intro
00:39 Question 1
02:42 Question 2
04:37 Question 3
06:20 Question 4
08:33 Question 5
10:22 Question 6
12:08 Question 7
13:44 Question 8
15:29 Question 9
17:25 Question 10
19:16 Question 11
21:00 Question 12
23:01 Question 13
24:56 Question 14
27:23 Question 15
29:19 Question 16
31:27 Question 17
34:05 Question 18
36:11 Question 19
38:17 Question 20
#securityplus #comptia #cybersecurity
This post contains affiliate links. This means I may earn a commission should you chose to sign up for a program or make a purchase using my link. It’s okay - I love all of these companies anyways, and you will too!
This video is not sponsored, endorsed or affiliated with CompTIA. This video does not have real questions from CompTIA exams, just ones that are formatted similar. This video is for educational purposes.
View Part 3 here: czcams.com/video/P0SzZcHWB6Y/video.html
Watch the CySA+ Series: czcams.com/video/xT6afzxvkJ0/video.html
Anyone else stressed out going through these realizing you don't know as much as you should for the exam?
Yes, I exactly feel like this.
Yup! But they good to highlight areas of weakness right! I have a mountain more study to do now! Haha.
Yep. Went through three study guide practice tests, exam compass, and the phone application questions, and this guy had more of the questions on the actual exam that I encountered on my first attempt. I feel like the only way to pass is through brute force memorization.
You got this i am too
Naw, Im locked in
On question 15, it specifically asks about "threat actor who exploits vulnerabilities" which implies a person or group, not an attack method, so I'm puzzled on why D is correct (even tho CompTIA says it is.) It's a badly worded question if D is the correct answer there.
Yeah this question makes no sense. But remember he might have made a mistake here because these are NOT official compTIA questions, if I understood correctly the questions are made by him.
exactly this! i picked up on it asking "who", indicating a person. and in fact, a script kidding absolutely would use scripts to exploit vulnerabilities thru code injection
I just stopped the video as I noticed the same thing. Actually taking my 701 exam in just a few hours.
Thanks James. I watched the week 1 Q&A before my exams and they were so helpful. Thanks alot James. I passed. Scored 773
NICE! Congratulations!
Just wanted to say thanks for your videos! I used them while preparing for my Security+ test and I passed on my first try today!
Congratulations!
Man..these are tough lol.. Crazy disparity between practice questions on CZcams (from one channel to another). I keep coming back to Cyber James because these are the ones I struggle w/ the most. But man, I hope the real test is SLIGHTLY easier (i.e. a middle ground between easy channels & CJ's questions)
Thanks. These are super helpful. I don't get question 15, because it sounds like it is specifically asking about what kind of threat actor is involved, not exploit. "Which of the following represents a threat actor- ". Wouldn't the answer BE a person and not an exploit? You ruled out the wrong answers based on them being people and not exploits. It seems like they usually word these questions so carefully.
Came to the comments because I was wondering the same thing.
Same. Plus buffer overflow doesn't even necessarily include code injections afaik
Sorry I just saw your comment! But you're right - When I was recording this as I read the question and possible answers it didn't make sense so I answered it like a normal CompTIA question. Based on the possible answers, I knew the "correct answer" would be D. I thought about talking about this in the recording but it was already pushing towards a long video. What happened was that the the person who made the presentation had two different questions mixed up from a project completely unrelated. If this happens again, i'll just address it in the video even if it makes it longer but it shouldn't happen again. Sorry!
Glad you explained it was an error because i was about to discredit the whole video
Thank you! Like many have mentioned, hearing your thought process helps!
Absolutely! Knowing the thought process is key to passing any CompTIA exam.
Thanks James! Your videos are great and pretty helpful. I’ll be watching your next videos
Thank you!
For Question 17, although you said its C , its not true in my opinion. I think its A cause you have not dealt with the threat yet, To eradicate the threat you must first contain it which means isolating the system so it cannot move further. If you restore the systems without eradicating the attack, the systems may be effected again.
Absolutely agree with you on Question 17. Isolating compromised systems cuts off the attacker's access to the network and prevents them from spreading to other systems. This is crucial for stopping the attack in its tracks and preventing further damage.
At first I would have agreed with you on choosing answer A but the question specifically asks for a method to “eradicate” the threat, not contain it. Which is what brought him to his conclusion.
@@lukebernadine828how is C eradicating the attack?
@@lukebernadine828 i agree with you. They are asking to eradicate and prevent further compromise, if we choose A we are only preventing further compromise by isolating them. But by restoring to good backups we are removing the threat from the affected systems and thus we are preventing further compromise.
@@bechararizk7245good point, thanks.
your a beast for adding the timestamps for each questions, well done, hope you continue on with your youtube career successfully.
Doing what I can to make the videos useful for people. Thank you!
Question 15 , it asked about threat actor not an attack!! The answer is C
Thankyou i thought i was trippin lol
It couldn't be C as C isn't a threat actor it is a type of threat. His answer doesn't make sense though I do agree
its not c lol, the best actor would be a script kiddie
SUBSCRIBED. Thank you for taking the time to make these videos. They are really helping me study
I’m glad they’re helpful!
Loving these videos! Have my test scheduled for Feb. 3rd, super intimidated but your videos seem to be resonating with me the most!
Thank you! When preparing for my Security+ exam I struggled finding realistic questions formatted similar to how CompTIA asks their questions. You got this!
Good job on these videos. Keep them coming.
Thanks, will do!
Thank you James. You are amazing
Aww thanks I appreciate that
Awesome content James, thanks for sharing. I m studying for this exact exam and am I really dreading the performance based questions in the test, have you made any videos of realistic PBQs?
Question 17: Why wouldn’t they isolate the system FIRST, THEN restore backups on an isolated or segmented system?
Enjoyed this, keep it up.
Glad you enjoyed it!
keep dropping these very useful
I'm glad they're helpful, I'll have a 3rd one uploaded within the next few days!
great teaching strategy, when i pass i will come and thank you.
I’m looking forward to it Kelvin!
Yep
I have scheduled my exam for the end of February. I love the way you structure these videos! I find myself doing the same thing of removing the wrong options and then focusing on the answers that could be right. Keep them coming 🙂
Hey I'm glad this is helpful! End of Feb, you definitely got this. I'll have the third one up in a few days!
How’d you do
@@bross_exe I actually pushed the test to this month! I had ordered some study materials from prof. Messer and they took a bit longer to arrive so I’m still studying to ensure I feel as prepared as possible 🙂 I’ll come back and let you know !
Do you have to wait a long time to schedule for the exam ?
@@bross_exe I passed!🙂
I take my exam on Tuesday and these reviews have been really helpful. If the questions are anything like the real exam then I am ready. The only thing I would recommend is for some of the questions that have a few "good" options, juts not the "best," then I would like to visually see in the answer explanation on why they weren't the correct answer. If that makes sense.
How was the real CompTIA exam compared to the questions in these videos? I feel as if the questions in the videos are easy.
Great content! Questions 13, 18, and 19 are not in the 701 objectives.
Thanks for these videos. Who is responsible for wording these questions?
17 should be A youre suppose to quarantine affected systems...relieve them from the network, than restore from backups or reimage. Whos to say this isnt a worm and when you restore an affected system still on the network another one gets affected.
20 aint a good question either if the answer is C. if the attack vector is a website than cross site scripting would be more relatable than a generic man in the middle attack. Mitm is an old term anyway that comptia is trying to replace with “on path attack”
Kali linux ettercap still uses “mitm” in there tabs for dns spoofing thats the only way i could give that answer justification.
@@9bytehub Question 20 says "manipulation of communication between a user and a website". None of the answers other than C manipulate the data that is going between the user and a website. XSS would be manipulating the data stored or shown on the website to the user directly.
@@bechararizk7245 I guarantee you the term man in the middle or MiTM will not show up on the comptia sy0-701 exam. They are doing away with that term. Course it’s good to know what it means to cross reference, but that will never be an answer in a future comptia exam. They are literally doing away with that term and using perimeter network and screen subnet.
It’s like the demilitarized zone we all know what it means, but that will never show up as an answer in a Comptia exam
@@9bytehubmitm applies to websites as well
Glad I found these. I took my test 3 days ago & made a 725, now I’m retaking it next week.
So close! Make sure to go over the areas where there's opportunity. Every objective you missed should be on the feedback exam document! You got this!
Question 5. It says help detect and respond. ips I thought only responds. If you want detect too you’d use ids too. Some kind of ips/ids mixture, or a next gen firewall has both built into it. Question is confusing. I could be wrong. 9:51
Loving these critical thinking questions. And thoughts behind it. Will the exam also have less complex questions ? or is it 90 questions of scenarios ? It gets trickier that way because many answer can also be correct.
Is number one really B? The account wasn't compromised. The threat was prevented from accessing it. The answer is even worded oddly since it says 'including the one-time passcode' but if they are locked out then the one-time passcode was clearly not accessible given the account was locked from failed login attempts. 🤔
We don't even know if the threat actor even had the right password to get to the passcode step.
Where can I practice this type of exam?
is this pretty close to the questions we will see? i only got 2 wrong so im pleased about that.
They’re similar. Something to keep in mind with this set of questions is that there aren’t many acronyms but on the real exam there will be loads of acronyms.
@@ImCyberJames ok thank you
Hello James will you be doing PBQ questions . Thanks again your videos are really helping me
Good suggestion, I might make some PBQ type questions in the future!
Question 15 wording needs to be changed if the answer is the attack itself and not which threat actor it is, the wording should go like "Which of the following represents WHEN a threat actor exploits ect..."
When you going to upload the third video?
I hope soon 🙏
Just got done recording, editing it now!
Could you share a pdf with these questions please so can make flash cards... ty
I might make a pdf out of these questions sometime in the future, thanks for the recommendation.
How do you know if you're ready? I am studying but I wish I had a benchmark
Whenever youre able to go through different practice questions and you get them right. Im guessing.
I hope your friend will continue to make the powerpoint for you.
I'll be recording another tomorrow!
Great
You are global by the way,
I am watching your videos from Saudi Arabia 🇸🇦🙏
Number 17 was extremely hard.I would've went with A. BTW Are these for 701 or 601?
These questions are based off of the 701, but people who still have a voucher for the 601 can still benefit from these questions.
I'm cooked.
it's for 601 or 701 wil you please confirm?
They’re similar enough that I wouldn’t worry about which version
@@connorvaziri9319 85% of material is different, completely different exams
@@andreipopescu2808 can I ask your source? I just passed the 701 with most of my study materials being from the 601 version
I AM INTERESTED IN YOUR PROGRAM AND WANT TO KNOW HOW TO STAY CONNECTED WITH YOU.
Feel free to subscribe there will be more content coming out. I don't offer mentorship or have a course or anything like that.
701?
This series uses objectives that match both the 601+701 exam.
SCP is not 701
I’m starting to think you’re peeking
I've gotten some wrong in these videos!
Question 1 is longer than 10 comptia question. Unless it’s a pbq. Come on now dude