CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following best describes a preventive control?
A control that stops a security incident or attack from happening before it can cause harm.
A control that substitutes for a primary control when it is not feasible or practical to implement.
A control that directs the actions of individuals or systems to maintain security.
A control that identifies and responds to security incidents after they have occurred.
Answer Description
A preventive control is a security measure designed to stop an incident or attack from occurring in the first place. Firewalls and access controls are examples of preventive controls that proactively protect systems and data by blocking unauthorized access or malicious traffic before it can cause harm. In contrast, detective controls identify incidents that have already occurred, corrective controls limit damage after an incident, and compensating controls serve as substitutes for primary controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of preventive controls?
What is the difference between preventive and detective controls?
Can you explain the concept of compensating controls?
Which network setup involves isolating a system from external network connections to enhance security?
Split tunneling
Software-defined network (SDN)
Air-gap
Virtual LAN (VLAN)
Answer Description
An air-gap refers to a network security measure where a system is physically isolated from unsecured networks, preventing external communication. This isolation enhances security by eliminating pathways that could be exploited by attackers. In contrast, a Virtual LAN (VLAN) and a software-defined network (SDN) provide logical network segmentation but do not physically isolate systems. Split tunneling allows simultaneous access to secure and unsecured networks, which can introduce security risks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key benefits of using an air-gap for security?
How do VLANs differ from air-gapped networks in terms of security?
What are scenarios where air-gapped networks are commonly implemented?
Which password policy most effectively enhances security by ensuring passwords are difficult to guess or crack?
Allowing users to reuse their previous six passwords to simplify password management.
Implementing a maximum password age of 90 days to ensure regular password changes.
Enforcing passwords to be at least 12 characters long and include uppercase letters, lowercase letters, numbers, and special characters.
Encouraging users to create passwords using easily memorable phrases.
Answer Description
Requiring passwords to be long and include a combination of uppercase letters, lowercase letters, numbers, and special characters significantly increases their complexity, making them harder to guess or crack. Allowing password reuse or limiting password age does not directly enhance password strength and can lead to weaker security practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a longer password more secure?
What are the best practices for creating complex passwords?
What are the risks of allowing password reuse?
To ensure the privacy and integrity of data as it traverses the public internet, which of the following is the BEST solution for a company connecting its remote office to the headquarters network?
Setting up additional access control lists at the network perimeter
Creating encrypted tunnels between the branch and the main office
Implementing an integrated cloud-based security and network solution
Activating private session capabilities within the company's intranet
Answer Description
Creating encrypted channels over a public network like the internet is essential for protecting sensitive data in transit. A Virtual Private Network (VPN) establishes an encrypted tunnel, which is required to maintain the confidentiality and integrity of data between two points. This technique involves creating a secure path over which data can be sent safely, ensuring that even if intercepted, the data remains unintelligible to unauthorized parties.
- Access control lists (ACLs) filter traffic but do not encrypt it.
- A cloud-based solution like SASE is a valid architecture, but the core protective technology it would use for this task is an encrypted tunnel.
- Intranet capabilities are confined to the internal network and cannot secure traffic over the public internet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are encrypted tunnels and how do they work?
What are the benefits of using a VPN for secure connections?
What is data integrity and why is it important?
During a risk assessment, a security analyst needs to determine the anticipated percentage of loss that an asset would suffer if a particular vulnerability were to be exploited. Which metric should the analyst calculate to quantify this potential loss?
Exposure factor
Impact score
Financial loss ratio
Annualized loss expectancy
Answer Description
The exposure factor (EF) is the metric that defines the anticipated percentage of an asset's value that could be lost if a given vulnerability were exploited. This metric is a critical component of a comprehensive risk assessment. While the other options might appear related to risk management, none of them specifically measure the potential percentage loss of an asset's value due to exploitation. An 'impact score' is typically a generalized rating rather than a precise percentage. A 'financial loss ratio' is not a standard term in risk management and does not accurately reflect the value loss of an asset due to a vulnerability. 'Annualized loss expectancy' is a calculation of expected loss over a year and incorporates both the exposure factor and the annual rate of occurrence, rather than just the loss associated with a single incident.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an exposure factor (EF) in risk assessment?
How does exposure factor (EF) relate to annualized loss expectancy (ALE)?
Why is understanding the exposure factor (EF) important for security analysts?
A financial organization's security team has detected a significant increase in phishing attempts against its employees. In response to this threat, the team has decided to employ a mechanism that verifies the identity of email senders and checks if the emails are from trusted sources before reaching the employees. Which type of security control is the team MOST likely implementing?
Technical Controls
Operational Controls
Physical Controls
Managerial Controls
Answer Description
The team is most likely implementing technical controls in the form of email security technologies, such as Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting, and Conformance (DMARC). These technologies help to verify sender identities and assess the trustworthiness of the emails, acting as preventive controls to stop phishing attempts before they reach the employees.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are technical controls in cybersecurity?
Can you explain SPF and DMARC in detail?
What is the difference between technical, operational, and managerial controls?
After a recent firewall change, several users report they can reach the internal intranet site but cannot browse any external websites. You discover that HTTPS traffic is being blocked. Which firewall port must be opened so users can securely access public websites again?
8080
80
3389
443
Answer Description
Web browsers establish encrypted sessions with external web servers using the HTTPS protocol, which by default uses TCP port 443. Allowing outbound (and corresponding return) traffic on this port restores secure web access. Ports 80 and 8080 carry unencrypted HTTP, while 3389 is used for Remote Desktop, so opening those would not solve the problem.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is port 443 used for HTTPS traffic?
What are the differences between HTTP and HTTPS?
What could cause port 443 to be blocked in a firewall configuration?
Which type of security control is used to stop incidents from occurring?
Corrective Controls
Preventive Controls
Compensating Controls
Detective Controls
Answer Description
Preventive controls are security measures that are put in place to prevent incidents from happening. They are proactive in nature and aim to stop threats before they can cause harm. Examples of preventive controls include firewalls, which block unauthorized access, and access controls, which restrict access to sensitive resources. Detective controls, on the other hand, are designed to identify and respond to incidents after they have occurred. Corrective controls aim to limit the damage after an incident, while compensating controls substitute for primary controls.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of preventive controls?
How do preventive controls differ from detective controls?
What are corrective and compensating controls?
An organization needs to determine how frequently to back up its critical data to minimize potential data loss during system failures. Which of the following factors is the MOST important to consider when setting the backup frequency?
The organization's network throughput
The cost associated with backup media
The maximum acceptable data loss the business can tolerate
The features provided by the backup software
Answer Description
Choosing the backup frequency is primarily driven by the maximum acceptable data loss the business can tolerate, known as the Recovery Point Objective (RPO). This defines how often backups need to be taken to meet business continuity requirements. While the cost of backup media is important for budgeting, it should not take precedence over critical data protection needs. The features of backup software may enhance backup processes but do not directly determine how often backups should occur. Network throughput can affect backup speed but is a technical constraint, not the primary factor in setting backup frequency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Recovery Point Objective (RPO)?
Why is it important to prioritize data protection needs over the cost of backup media?
How does network throughput affect backup processes?
An organization needs to ensure the integrity and authenticity of its software by proving the software has not been tampered with after release. Which type of certificate should be used to sign the software digitally before distribution?
Email certificate
Self-Signed certificate
Code Signing certificate
Root certificate
Answer Description
A Code Signing certificate allows developers to sign software digitally, which verifies the integrity of the software and ensures that it has not been tampered with since being signed. Self-Signed certificates could be used but aren't typically trusted by users' operating systems or browsers by default, thereby potentially raising security warnings. An Email certificate is used for securing email communication and ensuring the authenticity of the sender, not for software integrity. A Root certificate is at the top of a certificate chain and signs other certificates rather than being directly used to sign software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a Code Signing certificate and how does it work?
What are the potential risks of using a Self-Signed certificate instead of a Code Signing certificate?
What are the roles of Root certificates in the certificate chain?
During an incident response, a security analyst has identified a server that may have been compromised. The analyst decides to take an image of the server's hard drive for further analysis. Which of the following is the MOST critical step to ensure the integrity of the investigation?
Physically secure the server to prevent further access.
Limit access to the server by updating access control lists.
Document the process and the individuals involved in handling the server.
Generate a digital hash of the server's hard drive image.
Answer Description
Creating a digital hash of the hard drive image is critical to maintain the integrity of the investigation. Hashing the image ensures that an investigator can verify that the evidence has not been altered from the time of acquisition. This process establishes a unique digital fingerprint for the data at the moment of capture, which can be compared against the data at any point afterward to confirm that it remains unaltered. Physically securing the server and limiting access to the server are important, but they do not address the integrity of the digital evidence after its acquisition. Documenting the process is also essential but secondary to securing the image's integrity through hashing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a digital hash and how does it work?
Why is it important to ensure the integrity of digital evidence during an investigation?
What steps should be taken to properly document the incident response process?
A member of the IT department received a call from an individual claiming to be from the telecommunications company that provides services to the organization. The caller requested the IT staff member to confirm sensitive configuration details about the company's PBX system to help resolve an alleged network issue. Which of the following is the BEST course of action for the IT staff member to take?
Share the requested information to resolve the network issue promptly as the caller seems knowledgeable about the company's telecommunications setup
Place the caller on a brief hold to inform a supervisor about the request and then return to share the information
Verify the caller's identity by calling back on a known, official number of the telecommunications company before providing any information
Tell the caller to send an official request for information through email and then proceed with the call
Answer Description
The best action is to verify the identity of the caller through a callback to a known, official phone number for the telecommunications provider before discussing sensitive information. This is because providing such details over the phone without verification can lead to potential security breaches. Unverified calls, especially those requesting sensitive information, are likely to be vishing attacks where attackers attempt to extract critical information by impersonating legitimate entities. Unlike the incorrect options, immediate verification is critical and proper protocol in such situations; informing a supervisor is also advisable but does not directly address the potential immediate threat. Sharing the requested information or placing the caller on a brief hold without attempting to verify their identity doesn't reduce the risk associated with the potential vishing attempt.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is vishing and how can it affect organizations?
What are the best practices for verifying a caller's identity?
What are PBX systems and why is their security important?
Which operational control involves identifying, containing, and recovering from security incidents?
Incident response
Change management
Access controls
Answer Description
Incident response is the correct answer because it is an operational control that focuses on identifying, containing, and recovering from security incidents. Change management is incorrect because it deals with managing changes to systems and applications, not specifically security incidents. Access controls are preventive measures that limit access to resources, but do not directly address incident handling.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main phases of an incident response plan?
What is the difference between incident response and change management?
What types of incidents are typically handled in incident response?
An organization wants to address the risk associated with a potential financial loss from a future cyber attack. Which of the following actions exemplifies the 'Transfer' risk management strategy?
Developing a comprehensive incident response strategy for potential cyber attacks
Buying a cybersecurity insurance policy to cover costs associated with data breaches
Adjusting security controls to enhance detection of unauthorized access attempts
Conducting regular security awareness training for employees
Answer Description
Risk transfer is characterized by shifting the financial burden of a risk to another entity. Obtaining a cybersecurity insurance policy effectively transfers the financial risk of a cyber attack to the insurance company. Adjusting security controls to enhance detection would be an example of mitigation, which aims at reducing the risk's probability or impact. Developing a response strategy falls under preparedness and mitigation, as it prepares the organization to handle the impact, but does not transfer the risk. Lastly, training employees is a preventive measure and also falls into risk mitigation; it does not transfer the risk.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is cybersecurity insurance and how does it work?
What are other common risk management strategies besides transfer?
What are some examples of methods for mitigating cyber risks?
An organization is expanding its onsite data center infrastructure to accommodate a recent growth in remote workforce. They are concerned with the creation of a secure network architecture. In this scenario, which of the following would be the BEST solution to ensure secure remote access while minimizing the attack surface?
Configure a proxy server to control and filter outbound internet traffic.
Deploy an intrusion detection system at the network perimeter.
Use a jump server as the sole access point for network management.
Install a virtual private network (VPN) for secure remote connections.
Answer Description
Implementing a VPN would provide encrypted connections from remote locations to the data center, allowing for secure communication while limiting exposure to attacks. A proxy server primarily acts as an intermediary for users seeking resources from other servers and might not provide the necessary encryption for all communications. Intrusion detection systems (IDS) are crucial for monitoring and detecting potential threats but do not directly provide secure access for remote users. While a jump server can provide a controlled entry point into a network, it's not as comprehensive for remote access security as a VPN, which also encrypts the data in transit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VPN and how does it work?
What does minimizing the attack surface mean?
What role does encryption play in remote access security?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.