How to use SY0-701 flashcards effectively
Flashcards work through active recall — the process of retrieving information from memory rather than passively re-reading it. Research consistently shows that active recall produces stronger, longer-lasting memory than re-reading study guides. For SY0-701 preparation, this means flashcards are one of the highest-return study tools available.
Attempt recall first
Read the SY0-701 question on each card, pause, and attempt to formulate the answer in your own words before revealing. This retrieval attempt — even if wrong — dramatically strengthens memory compared to immediately reading the answer.
Review wrong cards again
When you get a card wrong, note it and add it back to your review pile. Spaced repetition — seeing difficult cards more frequently — is the mechanism that makes flashcard study far more efficient than linear reading.
Study by domain
Group your SY0-701 flashcard sessions by domain for the first 3–4 weeks. Master one domain before moving to the next. In the final week, shuffle all cards together to test cross-domain recall — which is what the real SY0-701 exam requires.
Short sessions beat marathon reviews
20–30 flashcard cards per session, done daily, produces better retention than a single 200-card marathon session. Five short daily sessions per week over 4 weeks gives you over 400 total card reviews — enough to reliably pass SY0-701.
SY0-701 flashcard preview
Sample cards from the SY0-701 flashcard bank. Read the question, think of the answer, then read the explanation below.
A security engineer writes a script that computes SHA-256 hashes of critical server configuration files every night and sends an alert if any hash value has changed since the previous night. Which security goal is this control primarily designed to protect?
Integrity
The use of cryptographic hashes to detect changes in files is a mechanism for enforcing data integrity. Integrity ensures that data has not been altered by unauthorized entities. In this scenario, the script ensures that any modification to the configuration files is promptly detected, preserving the trustworthiness of the data.
A financial institution updates its access control policy to require that two different system administrators must approve and execute any changes to the core transaction processing database. Which security principle is this practice primarily designed to enforce?
Separation of duties
Requiring two different administrators to approve and execute changes prevents any single individual from having unchecked control over critical operations. This directly supports the separation of duties principle, which reduces the risk of fraud, errors, or malicious activity by dividing responsibilities among multiple people.
A security analyst is reviewing web server logs from an e-commerce application. The logs show repeated requests containing URLs with appended strings such as: `' OR '1'='1' --` and `'; DROP TABLE Users; --`. The application returned HTTP 200 responses with unexpected data in several instances. Which type of attack is most likely being attempted?
SQL injection
The observed patterns are classic SQL injection attempts. The `' OR '1'='1' --` string attempts to bypass authentication by creating a true condition, and `'; DROP TABLE Users; --` attempts to execute a destructive SQL command. A successful SQL injection can allow an attacker to read, modify, or delete database contents. LDAP injection targets directory services, command injection executes OS commands, and XSS injects client-side scripts.
A security analyst is reviewing the source code of a custom network service written in C. The service allocates a 256-byte buffer and uses the strcpy() function to copy incoming data into that buffer without verifying the length of the input. If an attacker sends a specially crafted payload that exceeds 256 bytes, which security control would be most effective at detecting and preventing the resulting exploitation at runtime?
Stack canaries
The vulnerability is a classic buffer overflow that can overwrite the return address on the stack. Stack canaries are small values placed before the return address; if a buffer overflow occurs, the canary is corrupted, and the program terminates before control can be hijacked. This makes stack canaries the most direct runtime mitigation for stack-based buffer overflows. Transport Layer Security (TLS) encrypts data in transit but does not prevent buffer overflows in the application. Code signing ensures the integrity and authenticity of the binary but does not stop exploitation once the code runs. Data Execution Prevention (DEP) prevents execution of code in non-executable memory regions; however, attackers can bypass DEP using return-oriented programming (ROP), while a stack canary would still detect the overflow and abort.
A CFO at a mid-sized company receives an urgent email that appears to come from the CEO's email address, requesting an immediate wire transfer of $50,000 to a new vendor for a time-sensitive project. The email address displayed is 'ceo@cornpany.com' instead of the legitimate 'ceo@company.com'. The CFO follows the instruction and initiates the transfer. Later, the real CEO denies sending such a request. Which of the following security controls would have been MOST effective in preventing this type of attack from succeeding?
Implementing a policy that all financial transfers over a certain threshold must be verbally verified via a known phone number before execution
This attack is a form of business email compromise (BEC) or CEO fraud, where the attacker spoofs or uses a lookalike domain to impersonate an executive. The most effective prevention is implementing a mandatory out-of-band verification procedure, such as a phone call to a known number, before processing financial requests. Email filtering might catch some spoofed emails, but lookalike domains often bypass filters. Multi-factor authentication (MFA) protects account logins, not email-based impersonation. Encryption ensures confidentiality but does not validate sender identity. Security awareness training is helpful but human error can still occur; a hard validation procedure is more reliable for high-risk actions.
A user receives a phone call from someone who claims to be a member of the company's IT support team. The caller states that the user's account has been compromised and requests the user's username, password, and the current multi-factor authentication (MFA) code to 'verify identity and secure the account.' Which type of social engineering attack is being attempted?
Vishing
This scenario describes a vishing attack, which is a form of social engineering conducted over the phone. The attacker uses a fabricated pretext (a security emergency) to pressure the victim into disclosing sensitive credentials and MFA codes. Unlike spear phishing, which is email-based, vishing relies on voice communication. Pretexting is the broader act of creating a fabricated scenario, but the specific medium (phone) and goal (obtaining passwords and MFA) make vishing the most precise term. Tailgating involves physical unauthorized entry, not phone calls.
A company is redesigning its network to host a public-facing web application that accesses a confidential database. The security team needs to minimize the risk of a direct attack against the database server while still allowing the web server to retrieve and update data. Which network architecture best achieves this objective?
Place the web server in the DMZ and the database server on the internal network. Configure the firewall to allow inbound traffic from the web server to the database server on the required port only.
The preferred architecture for a public-facing web application with a backend database is to place the web server in a DMZ (or screened subnet) and the database server on the internal network with a firewall rule that permits only the web server's IP address to communicate with the database over the required port (e.g., 3306 for MySQL). This ensures that external users can only access the web server, and the database is not directly reachable from the internet. All other options introduce unnecessary exposure or complexity.
A security architect is designing a new data center network that will host public-facing web servers and internal application servers handling confidential employee data. The architect places the web servers in a DMZ and the internal application servers on a separate internal network segment. A stateful firewall is configured to allow inbound HTTP/HTTPS traffic from the internet to the web servers only. The firewall also permits only the web servers to initiate outbound connections to the internal application servers on a specific TCP port, and all such traffic is encrypted using TLS. Which security architecture principle is this design primarily intended to enforce?
Defense in depth
The design incorporates multiple layers of security controls: network segmentation (DMZ vs. internal), restrictive firewall rules, and encryption of inter-server communications. This layered approach is the hallmark of defense in depth. While the design also applies least privilege by limiting which servers can communicate and on which ports, the primary intent of combining these different controls is to ensure that if one layer fails, other layers still provide protection. Separation of duties relates to dividing administrative privileges among multiple individuals, not network zoning. Zero trust would require continuous verification of every request, which is not fully implemented here because the firewall rule implicitly trusts the web servers to communicate with the internal application servers without further authentication.
A company's current remote access solution uses a traditional VPN that grants users full network-layer access to the internal LAN once authenticated. The security architect wants to adopt a zero trust architecture to reduce the risk of lateral movement by compromised endpoints. Which of the following implementations best aligns with zero trust principles?
Use a software-defined perimeter that authenticates each user and device before granting access only to specific applications.
Zero trust architecture operates on the principle of 'never trust, always verify' and typically grants access only to specific resources on a per-session basis after verifying user identity, device health, and other contextual factors. A software-defined perimeter (SDP) or a zero trust network access (ZTNA) solution directly enforces this by creating an encrypted, micro-segmented connection to each application rather than broad network access. Option C is the correct choice. Option A (firewall with strict rules) still provides network-layer access after authentication, which violates the least-privilege and micro-segmentation goals. Option B (secure web gateway) only handles web traffic and does not replace the need for application-specific zero trust controls for all remote services. Option D (MFA plus VPN with split tunneling) improves authentication but still grants broad LAN access once inside, failing to contain lateral movement.
A security architect is designing a solution to process highly sensitive financial transactions in a shared cloud environment. The architect needs to ensure that the processor and memory used to handle transaction data are isolated from the host operating system and other virtual machines, even if the hypervisor is compromised. Which technology is specifically designed to provide this level of isolation for code and data during runtime?
Secure enclave (e.g., Intel SGX)
The scenario requires hardware-enforced isolation of runtime processes and memory from the underlying OS and hypervisor. This is a core capability of a secure enclave (e.g., Intel SGX, AMD SEV). A TPM provides attestation and secure storage but does not isolate runtime memory. An HSM protects cryptographic keys and operations but is not designed for general-purpose code execution isolation. Secure Boot ensures only trusted bootloaders are loaded but does not protect applications at runtime.
A SOC analyst receives an alert from the EDR system indicating that the process 'C:\Program Files\Vendor\Updater.exe' attempted to modify the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run registry key on a user's workstation. The analyst checks the file hash and finds it matches a known legitimate software updater. Which of the following actions is most appropriate for the analyst to take?
Investigate the user's recent activity and check for signs of process hollowing or DLL injection.
Legitimate processes can be abused by attackers using techniques such as process hollowing, DLL sideloading, or command-line injection. The analyst should not immediately assume the process is benign simply because the file hash matches a known good file. Further investigation, such as checking for suspicious parent-child process relationships, unusual command-line arguments, or signs of injection, is necessary to determine if the updater is being used maliciously. Creating an exception blindly could allow malicious activity to persist undetected, while disabling the updater may disrupt necessary software updates. Isolation and reimaging are too aggressive without confirmed compromise.
A SOC analyst is reviewing logs from a Windows domain controller and notices a large number of failed logon attempts (Event ID 4625) from a single source IP address within a five-minute window. The account names used are random strings such as "a1b2c3", "x9y8z7", etc. The analyst then checks the source IP and finds it is a known external address from a foreign country. Which of the following is the most appropriate next step for the analyst to take?
Investigate whether any of the attempted accounts correspond to actual domain users.
The pattern of failed logon attempts with random account names from an external IP is indicative of a password spraying or dictionary-based brute-force attack. The primary concern is whether any of the targeted accounts are valid domain users because a successful login could have occurred and might not appear as a failure. Before taking irreversible actions such as blocking the IP or escalating to legal, the analyst should investigate if any valid accounts were attempted, as that could indicate a potential compromise. Running an antivirus scan on the domain controller is not directly relevant to the immediate threat, and notifying legal is premature without more evidence.
A security operations analyst is tuning a SIEM correlation rule designed to detect brute-force password attacks against domain user accounts. The current rule generates an alert when a single user account has more than 10 failed logon attempts within a 5-minute window. The SOC team is overwhelmed by thousands of alerts each day, the vast majority of which are triggered by legitimate users who accidentally mistype their passwords. Which of the following modifications to the rule would most effectively reduce false positives while still detecting actual brute-force attacks?
Modify the rule to trigger only when the failed attempts originate from multiple distinct source IP addresses.
The goal is to distinguish between accidental mistypes (single IP, low volume) and true brute-force attacks (often distributed across multiple IPs). Option B achieves this by requiring the failed attempts to come from multiple distinct source IPs, which is a strong indicator of an automated attack using proxies/botnets. Option A simply raises the threshold, which may miss slower or cautious attackers. Option C targets password spraying (multiple accounts, single password) rather than single-account brute force. Option D is unreliable because users may not submit password reset requests, and it could be bypassed by an attacker who also requests a reset. Therefore, B is the most effective tuning technique.
A security analyst is responding to a potential ransomware incident on a Windows server that is still running. The analyst needs to preserve forensic evidence for analysis. Which of the following actions should the analyst perform first, based on the order of volatility?
Capture a full memory dump of the server
The order of volatility (OOV) dictates that the most volatile data (data that changes rapidly or is lost when power is removed) should be captured first. Memory (RAM) is the most volatile because it contains running processes, network connections, and encryption keys that disappear when the system is shut down or rebooted. Capturing a memory image before any other action ensures that this critical evidence is preserved. Disks contain persistent data but are less volatile, while shutting down the system would destroy volatile data. Running an antivirus scan alters the system state and can destroy evidence.
A security analyst is monitoring logs from the cloud access security broker (CASB) and observes that a user account downloaded 500 GB of data from a highly sensitive SharePoint document library within a single hour. The user's historical baseline shows an average daily download of less than 10 MB. Additionally, the log shows the session originated from an IP address in a country where the company has no employees or business operations. Which of the following actions is the most appropriate for the analyst to take?
Initiate the organization's incident response process for a potential data exfiltration event.
This scenario describes a classic indicator of data exfiltration: a user account exhibiting behavior wildly outside its baseline (500 GB vs. <10 MB daily) combined with a login from an unexpected geographic location. The most appropriate action is to initiate the organization's incident response process, which will trigger a formal investigation, contain the threat, and preserve evidence. While contacting the user or temporarily blocking the account might seem reasonable, these steps should be performed under the guidance of the incident response plan to avoid alerting a potential attacker or destroying evidence. Disabling the entire SharePoint site is an overreaction that would disrupt all users.
A security analyst in the SOC is investigating a potential DNS tunneling incident. The analyst has identified a workstation that is making thousands of DNS queries to an external domain with base64-encoded subdomains. The analyst suspects that sensitive files from the workstation are being exfiltrated by encoding their contents into the subdomains of the DNS queries. Which of the following log sources will provide the most definitive evidence to confirm that the contents of a specific sensitive file are being transmitted in the DNS queries?
A full packet capture of the network traffic from the workstation showing the complete DNS messages.
DNS tunneling exfiltrates data by encoding it into the subdomain portion of DNS queries. To confirm that the data from a specific file is being sent, the analyst needs to inspect the full content of the DNS query packet. A full packet capture of the network traffic includes the entire DNS message, including the complete subdomain string, which can be decoded and compared directly to the contents of the suspected file on the workstation. DNS server logs often truncate long subdomain names or may not log them at all, making them less reliable. Process creation logs show which program made the queries but not the transmitted data. Firewall logs only show connection metadata and cannot reveal the payload of the DNS queries.
A company is evaluating a new cloud-based customer relationship management (CRM) provider. The provider’s documentation includes a SOC 2 Type II report, but the company’s compliance team specifically requires evidence that data in transit is encrypted using TLS 1.2 or higher, and data at rest is encrypted with AES-256. Which of the following actions best demonstrates that the company has performed proper due diligence in vendor risk management?
Review the detailed control descriptions and auditor test results within the SOC 2 Type II report that address encryption of data in transit and at rest.
Proper due diligence in vendor risk management involves verifying that the vendor’s security controls meet the company’s specific requirements, not just accepting broad attestations. A SOC 2 Type II report contains detailed descriptions of controls, including encryption practices, and an auditor has tested their operating effectiveness over a period of time. Reviewing the relevant control descriptions and test results within the report is the most direct and reliable way to confirm the required encryption standards are in place. The other options are either insufficient, create unnecessary cost, or fail to provide evidence of actual control effectiveness.
SY0-701 flashcards by domain
The SY0-701 flashcard bank covers all 5 official blueprint domains published by CompTIA. Cards are distributed proportionally, so domains with higher exam weight have more cards.
Domain Coverage
General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
Flashcards vs practice tests: which is better for SY0-701?
Both flashcards and practice questions are evidence-based study tools. The difference is in what they train:
Flashcards — concept retention
Best for memorising definitions, acronyms, protocol behaviours, command syntax, and conceptual distinctions. Use flashcards to build the foundational vocabulary that SY0-701 questions assume you know.
Best in: weeks 1–3
Practice tests — application
Best for applying concepts to realistic scenarios, eliminating distractors, and building exam stamina.SY0-701 questions test scenario reasoning — not just recall — so practice tests are essential.
Best in: weeks 3–6
The most effective SY0-701 study plan combines both: use flashcards for the first 2–3 weeks to build conceptual foundations, then shift to practice tests and mock exams in the final 2–3 weeks to apply and benchmark that knowledge. Most candidates who pass on their first attempt use both tools.
SY0-701 flashcards — frequently asked questions
Are the SY0-701 flashcards free?
Yes — all SY0-701 flashcards on Courseiva are completely free, no account required. Every card includes the question, correct answer, and a full explanation. Create a free account to track which cards you have studied and get spaced repetition recommendations.
How many SY0-701 flashcards are on Courseiva?
Courseiva has 1112+ original SY0-701 flashcards across all 5 exam blueprint domains. New cards are added regularly as the question bank grows. All cards are written by certified engineers against the official CompTIA exam objectives.
How are Courseiva flashcards different from Anki or Quizlet?
Courseiva flashcards are purpose-built for IT certification exams. Unlike generic flashcard platforms where content quality varies, every Courseiva card is mapped to the official SY0-701 exam blueprint, written by engineers who hold the certification, and includes a full explanation of the correct answer and why the distractors are wrong. This explanation quality is what separates genuine learning from rote memorisation.
Can I use SY0-701 flashcards offline?
Courseiva is a web platform — an internet connection is required. For offline study, we recommend creating free Courseiva account, using the platform in your browser, and using your device's offline capabilities if your browser supports offline web apps.
Track your SY0-701 flashcard progress
Save your results, see which domains need more work, and get spaced repetition recommendations — all free.
Sign Up FreeFree forever · Every certification included