00:15:00

Free CompTIA Security+ SY0-701 Practice Test

Prepare for the CompTIA Security+ SY0-701 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.

  • Questions: 15
  • Time: 15 minutes (60 seconds per question)
  • Included Objectives:
    • General Security Concepts
    • Threats, Vulnerabilities, and Mitigations
    • Security Architecture
    • Security Operations
    • Security Program Management and Oversight
Question 1 of 15

There are multiple different access control schemes that can be implemented within an organization. Which type of scheme restricts access based on sensitivity levels and is typically associated with the military?

  • ABAC

  • RuBAC

  • RBAC

  • MAC

  • DAC

Question 2 of 15

A multinational corporation is looking to streamline its network infrastructure by integrating both its networking and security services into a single, cloud-based solution that supports dynamic and secure access for their distributed workforce. Which solution aligns BEST with these requirements?

  • An integrated platform designed to simplify security management by providing a suite of security features through a single appliance

  • A service primarily focused on inspecting inbound and outbound web traffic to protect against web threats at application level

  • An advanced networking security device offering enhanced inspection capabilities that go beyond traditional stateful inspection

  • A global cloud-native service that combines networking and security functions to deliver secure, policy-based access to company resources for any user, anywhere

Question 3 of 15

What does MTBF stand for, and what does it indicate regarding a system's reliability?

  • Maximum Time Before Failure, indicating the longest time a system can function before it fails

  • Minimum Time Before Failure, reflecting the shortest time a system might operate before encountering an issue

  • Mean Time Between Failures, measuring the average time operational between system breakdowns

  • Mean Time Before Fix, representing the average time to repair a system after a failure

Question 4 of 15

The software section of the security team has been asked to review the source code for a program being developed. They are being asked to look for any coding errors or possible security vulnerabilities. This is what type of application security review?

  • Fuzzing

  • Secure coding

  • Static code analysis

  • Dynamic code analysis

Question 5 of 15

Changing the default port of a secure service to a non-standard port is considered a sufficient security control to prevent unauthorized access

  • True

  • False

Question 6 of 15

Backup systems are implemented to restore data and system functionality after data loss or corruption occurs.

  • False

  • True

Question 7 of 15

Which of the following best describes the primary purpose of a security policy?

  • To define access control lists for network resources

  • To detail specific incident response procedures

  • To provide a high-level framework for an organization's approach to security

  • To specify encryption standards for data at rest and in transit

Question 8 of 15

Your organization is experiencing rapid growth and expects a significant increase in online transaction volume over the next year. As a security professional assessing the infrastructure to accommodate future demands, which of the following would be the BEST measure to ensure the infrastructure can scale securely and effectively?

  • Vertically scale the existing infrastructure by upgrading the current server to a model with more processing power and memory.

  • Consolidate all data storage into a single geographic region to reduce complexity and ensure all users access the same resources.

  • Plan for horizontal scaling by adding additional servers or utilizing cloud-based resources to distribute the load evenly across multiple hardware platforms.

  • Invest in a more powerful server to replace the current one, ensuring that the new hardware can handle the anticipated load for the next year.

Question 9 of 15

An organization is reviewing their incident response plan in light of new threats detailed in a recent security bulletin. When prioritizing actions, which of the following is the BEST immediate step for the organization to take to prevent a breach?

  • Immediately revise their incident response plan to include the new threats.

  • Update the organization's security documentation to reflect the newly identified threats.

  • Monitor network traffic for indicators of compromise associated with the published threats.

  • Assess and apply necessary patches or updates for documented vulnerabilities.

Question 10 of 15

Which type of security control is primarily intended to discourage a potential attacker from attempting to breach your security perimeter?

  • Directive

  • Corrective

  • Deterrent

  • Detective

  • Compensating

  • Preventive

Question 11 of 15

During a routine security audit, the auditor discovers that two different archived log files generate the same hash value despite having different contents. Which of the following type of attack might have occurred?

  • Collision attack

  • Key exchange method

  • Hashing algorithm speed

  • Password entropy

Question 12 of 15

Which component is built into a computing device to provide secure generation, storage, and use of cryptographic keys?

  • Hardware Security Module

  • Trusted Platform Module

  • Biometric Sensor

  • Secure Boot

Question 13 of 15

A company's security monitoring tools have flagged an escalating trend in unauthorized attempts targeting employee accounts on the corporate portal. Which countermeasure should be considered first by the security analyst to counteract this activity?

  • Implement a lockout policy.

  • Increase the logging level of the portal access logs.

  • Conduct a comprehensive network vulnerability scan.

  • Renew all SSL certificates used by the company.

Question 14 of 15

What type of risk assessment is conducted as needed, often in response to specific events or changes in the environment?

  • Ad Hoc

  • Qualitative

  • Continuous

  • Recurring

Question 15 of 15

During disposal of storage media, due to regulatory requirements some of the data is required to be saved for a certain period of time. This is an example of what?

  • Destruction

  • Certification

  • Sanitization

  • Data retention