CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA Security+ SY0-701 Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
What process converts plaintext into a coded format to prevent unauthorized access?
Encryption
Hashing
Obfuscation
Tokenization
Answer Description
Encryption is the process of converting plaintext into a coded format known as ciphertext, which can only be read by authorized parties who have the decryption key. This process uses an algorithm and a key to transform the readable data into an unreadable format, thereby protecting the data from unauthorized access or eavesdropping.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is encryption and how does it work?
What is the difference between encryption and hashing?
What are common encryption algorithms used today?
When managing vulnerabilities within an organization's infrastructure, which criteria should be considered MOST important for prioritization?
Popularity of the software with vulnerabilities
Potential impact on business operations
Security team's personal preference
Ease of implementation for the fix
Answer Description
The correct answer is 'Potential impact on business operations' because when prioritizing vulnerabilities, the primary concern is how a vulnerability might affect critical business functions and operations. If the impact is high, it could lead to significant loss or damage, so these vulnerabilities need to be addressed first. Other options such as the ease of implementation, popularity of the software, and personal preference are considered, but they do not outweigh the importance of the potential impact on business operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is the potential impact on business operations the most important criterion for prioritizing vulnerabilities?
Can you provide examples of vulnerabilities that have had significant impacts on business operations?
What other factors might influence the prioritization of vulnerabilities besides potential impact?
A large financial institution is preparing to revise its security protocols to enhance the protection of client data. The institution has multiple international offices and must comply with various regional encryption standards. Which of the following should be the primary consideration when updating the company-wide encryption standard?
Adopt the strictest regional encryption standard as the company-wide standard to ensure compliance across all locations.
Develop a new encryption standard internally that is different from all regional standards but meets the minimum required security level.
Follow only the regional encryption standards of the country where the financial institution's headquarters is located.
Implement the least strict regional encryption standard to minimize complications in international operations.
Answer Description
The correct answer is the one that aligns with the goal of adhering to the highest regulatory requirements across regions. This ensures that the financial institution complies with all regional regulations while maintaining a uniform standard of security. Implementing the strictest regulatory standard as the company-wide standard is a common approach to simplifying compliance and ensuring the highest security posture is maintained throughout the organization, regardless of location. Options involving conflicting national and local standards, as well as those suggesting the development of new internal standards or solely following the least strict, do not address the overarching need to meet all regional compliance requirements efficiently.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are regional encryption standards?
Why is it important to adopt the strictest encryption standard?
What might be the consequences of not following these standards?
When updating security policies after a software upgrade, which of the following is the BEST method to ensure the policies are correctly understood and enforced across the organization?
Mandating immediate adherence to the updated policies without a review process.
Conducting an approval process involving key stakeholders to review and accept the updated policies.
Informing only the security team about the updated policies and assuming other departments will follow suit.
Requiring the IT department to implement the updated policies without obtaining consensus from other departments.
Answer Description
Having an approval process for the updated security policies is the best method to ensure they are correctly understood and enforced, as it involves reviewing and formally accepting the changes by authorized stakeholders. An approval process typically includes checks and balances to prevent errors and omissions and establishes a clear understanding of new policies before they are implemented.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an approval process in the context of security policies?
Why is it important to involve key stakeholders in policy updates?
What are the consequences of not having an approval process for security policies?
Allow lists are a security measure that permits only approved entities to access resources.
True
False
Answer Description
Allow lists specify which entities are permitted access, enhancing security by restricting unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are allow lists and how do they work?
What are some advantages of using allow lists over deny lists?
How do I create an effective allow list?
Snapshots capture the state of a system at a specific point in time for backup purposes.
True
False
Answer Description
Snapshots indeed record the system's state at a particular moment, allowing for restoration to that exact point if needed. This is a common method used in backups to ensure data consistency and quick recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does a snapshot include?
How are snapshots different from traditional backups?
Are there any risks associated with using snapshots for backups?
During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?
Containment
Lessons learned
Eradication
Recovery
Answer Description
Containment is the correct answer because the immediate priority in incident response, following detection and analysis, is to contain the incident to prevent further damage or spread of the threat. Eradication and Recovery are subsequent steps that cannot be effectively performed unless the threat is first contained.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does containment mean in incident response?
Why is eradication a subsequent step and not the first priority?
What are the key phases of incident response after containment?
A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?
Deploying mantraps at the primary entrance to the data center
Installing highly visible security cameras around the perimeter and entry points
Erecting security awareness posters regarding tailgating in employee areas
Implementing badge readers at all points of entrance and exit
Answer Description
Security cameras are a form of deterrent control designed to discourage unauthorized individuals from attempting to access a secure area. Their presence is often enough to dissuade potential attackers as it increases the likelihood of being caught and recorded, which can lead to identification and potential prosecution. In contrast, badge readers and mantraps, while part of physical security measures, are types of preventive controls that actively prevent unauthorized access. Security awareness posters do not directly discourage trespassers from entering secured premises, as they are more focused on educating authorized personnel on maintaining security practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are deterrent controls in security?
How do security cameras help in deterring crime?
What is the difference between deterrent controls and preventive controls?
In the context of cybersecurity, what is a primary security concern when dealing with suppliers?
Data corruption during transmission
Unauthorized data sharing
Inadequate customer service
Compromised hardware or software
Answer Description
The correct answer is 'Compromised hardware or software' because suppliers have direct access to the components and programs that enterprises use, making it possible for them to introduce compromised products into an organization's infrastructure. 'Data corruption during transmission' focuses on data in transit rather than supply chain vulnerabilities. 'Inadequate customer service' does not directly relate to security issues, and 'Unauthorized data sharing' is a concern with entities that handle data, but it does not specifically relate to the risks posed by suppliers in the supply chain.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for hardware or software to be compromised?
What are some examples of how suppliers can introduce compromised products?
What steps can organizations take to mitigate risks from compromised suppliers?
Your employer has a large team of software developers with constantly changing codebases for dozens of internal applications. As a part of change control any code changes go through an automated vulnerability scanning process which checks for known vulnerabilities in frameworks, programming languages, dependencies and the code itself. Due to business pressure these scans have been largely ignored and there are currently over a thousand issues found by the automated scanning. You are tasked with working with the developers and remedying 100% of the issues. What should you do next?
Stop all deployments, code changes and updates until the vulnerabilities are fixed
Identify any false positives to reduce the number of items to remediate
Organize the vulnerabilities by criticality and begin planning for solutions for the most critical vulnerabilities first
Implement an approval step for all code changes that requires no security issues prior to updates
Answer Description
In this scenario the best option for next steps is to organize the vulnerabilities by criticality. Some may be very important and represent significant risk, while others may be false positive or very minor issues. Most scanning solutions will have this information readily available. There is no way to identify false positives without going through each and every one, and halting all code changes would likely cause major disruptions to the business. The logical next step is to begin planning and focus on the worst issues first.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are false positives in vulnerability scanning?
What does it mean to organize vulnerabilities by criticality?
Why is it important to plan remediation for vulnerabilities?
An employee in your organization received a call from an individual claiming to be from the IT department. The caller stated they were conducting routine security checks and needed the employee's username and password to ensure his account is secure. The caller is exceptionally polite and knowledgeable about company protocols. Which type of social engineering attack is MOST likely occurring?
Phishing
Pretexting
Baiting
Quid pro quo
Answer Description
Pretexting involves the creation of a fabricated scenario designed to persuade a victim to release information or perform some action. In this case, the attacker is pretending to be a familiar and legitimate entity—such as an IT department representative—to gain the trust of the employee and obtain sensitive information. This is a common tactic where attackers carefully craft a believable story that seems legitimate to the victim.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is pretexting and how is it different from other social engineering attacks?
Can you provide an example of another pretexting scenario?
What steps can employees take to protect against pretexting attacks?
Process hollowing is a technique where an attacker can insert malicious code into the address space of a running process.
The statement is false
The statement is true
Answer Description
Process hollowing is indeed a memory injection technique where an attacker creates a new process in a suspended state and replaces its image with malicious code, effectively 'hollowing out' the legitimate process. This can be used to evade detection from security software that is monitoring for the launch of malicious processes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is process hollowing and how does it work?
Why is process hollowing used by attackers?
What are the signs of process hollowing and how can it be detected?
You have joined a new enterprise as a member of the IT Security team. During on boarding you receive two computers, one with access to highly confidential systems and one with access to less critical data and the internet. You cannot send data or documents from one network to the other and have to manage separate credentials for each. What concept best defines this approach?
Data aggregated network segmentation (DANS)
Air gap
Physical de-segmentation
VPN
Answer Description
This setup is best known as an air gap. In network an air gap means two or more networks are physically separated from each other to ensure no data can traverse from one to the other. Generally if a network is so critical it requires an air gap it will be a completely stand alone network with no access to other networks and especially the internet. A true air gap is not common in most businesses, but some known examples are government or military networks, highly critical infrastructure networks like nuclear power plant controls and financial systems like stock exchanges.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key benefits of using an air gap in network security?
What situations commonly require an air gap setup?
How does an air gap differ from other network security measures like a VPN?
Which of the following types of tests best describes a scenario where participants walk through the steps of various disaster recovery procedures without actually performing any recovery operations?
Tabletop exercise
Simulation
Failover
Parallel processing
Answer Description
A tabletop exercise is a type of test where participants verbally walk through the steps of various emergency scenarios and disaster recovery procedures. It is designed to test the theoretical response to a disaster, ensuring that all individuals know their roles and responsibilities, without actually performing any recovery operations or disrupting the current operations. Other options, such as simulation and failover, involve more active engagement with systems or demonstration of the disaster recovery process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a tabletop exercise?
What are some benefits of conducting a tabletop exercise?
How does a tabletop exercise differ from a simulation?
Which of the following is a system designed to attract and trap potential attackers, allowing cybersecurity professionals to study their methods and techniques?
Honeypot
Virtual Private Network (VPN)
Intrusion Detection System (IDS)
Firewall
Answer Description
A honeypot is a decoy system that mimics a legitimate system to attract and trap potential attackers. It is intentionally made vulnerable to entice malicious actors, allowing cybersecurity professionals to monitor and analyze their behavior, methods, and techniques. This information can then be used to strengthen the security of real systems and develop more effective defenses against future attacks. Honeypots are an essential tool in deception and disruption technology, as they help detect and deflect attacks away from critical systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of honeypots?
How does a honeypot help improve network security?
What are some best practices for deploying honeypots?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.