CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
When a digital certificate needs to be invalidated prior to its expiration, which of the following is updated to indicate that this certificate should no longer be trusted?
Certificate Signing Request (CSR)
Online Certificate Status Protocol (OCSP)
Root of Trust
Wildcard Certificate
Certificate Revocation List (CRL)
Answer Description
A Certificate Revocation List (CRL) is a list of certificates that have been revoked before their scheduled expiration date, and should no longer be trusted. Certificate Authorities (CAs) maintain this list to ensure that any certificate that has been compromised or is no longer valid for some other reason can be quickly identified by clients checking the CRL.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of a Certificate Authority (CA) in relation to a CRL?
How does the CRL differ from the Online Certificate Status Protocol (OCSP)?
What are some common reasons for revoking a digital certificate?
The software section of the security team has been asked to review the source code for a program being developed. They are being asked to look for any coding errors or possible security vulnerabilities. This is what type of application security review?
Static code analysis
Dynamic code analysis
Secure coding
Fuzzing
Answer Description
Static code analysis is the analysis of software code without executing the software. Reviewing the lines of a program’s/software’s source code is a type of static code analysis. Dynamic code analysis is performed while it is being executed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of static code analysis in application security?
How does static code analysis differ from dynamic code analysis?
What tools are commonly used for static code analysis?
A corporation requires a method to ensure that its staff can connect to internal resources from outside the office environment with assured confidentiality and integrity of data. Which solution would BEST meet this requirement while providing encrypted channels for remote endpoint connectivity?
Setting up remote access servers that allow direct connections from the internet.
Utilizing end-to-end encrypted tunneling services with access control.
Configuring encrypted gateways at the network perimeter for enhanced security.
Enforcing perimeter security controls that prevent unauthorized network entry.
Answer Description
A solution that creates an encrypted tunnel to the corporate network is essential for secure remote access. The most appropriate technology for establishing such secure connections is a solution that encapsulates and encrypts data as it travels over possibly insecure networks, like the internet, requiring proper authentication from the connecting users to access internal network resources. Implementing remote access servers without additional encryption would not ensure data confidentiality and integrity. Configuring encrypted gateways focuses solely on securing gateways but does not address endpoint-to-network secure connectivity. Secure network perimeters enhance the overall network security but do not inherently provide secure remote access capabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is end-to-end encrypted tunneling?
How does a VPN work to secure remote connections?
Why are remote access servers alone not sufficient for secure connectivity?
As the lead security analyst at a financial institution, you have been tasked with evaluating the effectiveness of the implemented security controls. During the audit, you need to verify that access control policies are correctly enforced and that there are no deviations from the standard configurations across all servers. Which of the following audit practices would be the MOST effective for this purpose?
Performing a performance audit
Conducting a configuration audit
Undertaking an operational audit
Executing a financial audit
Answer Description
A configuration audit specifically assesses configurations against established security baselines and policies, ensuring that systems are compliant with the required security settings. This would detect deviations in access control policies and configurations from the standard across servers. A performance audit, while it assesses the efficiency and effectiveness of an organization's processes, would not focus solely on security settings and policies. A financial audit is concerned with the financial accounts and transactions of an organization, and while an operational audit evaluates the operational aspects of an organization, it does not concentrate on access control policies and system configurations to the extent necessary for the given task.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a configuration audit?
How do access control policies relate to configuration audits?
What are examples of tools used for conducting configuration audits?
Which activity is MOST critical for an organization to perform when establishing an incident response capability to ensure effectiveness during security incidents?
Holding a retrospective meeting to discuss incident handling
Developing and documenting the incident response policy
Distributing the employee security handbook
Conducting regular employee background checks
Answer Description
Developing and documenting an incident response policy is the MOST critical activity for establishing an incident response capability. This policy outlines the purpose, scope, roles, responsibilities, and management commitment. It serves as the foundation for the entire incident response process. Distributing an employee handbook only communicates existing policies and procedures, conducting background checks is an HR security measure, and holding a retrospective meeting is an activity that takes place after an incident has been handled (part of the 'Lessons Learned' phase).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an incident response policy so critical?
What are the key components of an incident response policy?
How does an incident response policy differ from an employee security handbook?
A company's IT department recently received complains from several employees that they've been contacted by 'tech support' via phone call, requesting their login credentials to resolve a supposed network issue. Which of the following best describes this type of security threat?
Email phishing
Pretexting
Vishing
Smishing
Answer Description
The correct answer is 'Vishing'. Vishing, or voice phishing, involves an attacker using the telephone system in an attempt to scam the user into disclosing private information by pretending to be a legitimate entity, in this case, the company's IT department. Email phishing is incorrect as it specifically refers to the use of emails for scamming users. Smishing involves sending text messages, which is not the case here. Moreover, Pretexting generally refers to a scenario where an attacker comes up with a fabricated scenario to steal information, but the key difference lies in the means, which here is a phone call characteristic of vishing.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is vishing, and how does it differ from other phishing techniques?
What are common signs that a phone call might be a vishing attempt?
How can companies train employees to avoid falling for vishing attacks?
During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?
Recovery
Containment
Lessons learned
Eradication
Answer Description
Containment is the correct answer because the immediate priority in incident response, following detection and analysis, is to contain the incident to prevent further damage or spread of the threat. Eradication and Recovery are subsequent steps that cannot be effectively performed unless the threat is first contained.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does containment mean in the context of incident response?
Why is containment prioritized over other incident response steps?
What are examples of containment techniques during a security incident?
An organization experienced a data breach compromising customer data. Following the incident, the security team implemented measures to restore affected systems and reduce the impact of the breach. Which of the following actions is an example of a corrective control?
Displaying warning banners on login screens to deter unauthorized access.
Restoring data from backups and applying patches to affected systems.
Implementing stronger network firewalls to prevent future breaches.
Conducting a forensic analysis to determine how the breach occurred.
Answer Description
Restoring data from backups and applying patches to affected systems are actions that limit the damage after an incident, making them examples of corrective controls. These steps aim to fix the issues caused by the breach and prevent further impact. Conducting a forensic analysis is a detective control, as it involves identifying how the breach occurred. Implementing stronger network firewalls is a preventive control designed to stop future incidents. Displaying warning banners is a deterrent control meant to discourage unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between corrective, preventive, detective, and deterrent controls?
Why is restoring data from backups considered a corrective control?
How does applying patches help as a corrective control?
XYZ Corporation utilizes a primary and secondary data center for their mission-critical systems to maintain uptime in case of failure. When the primary data center experiences an outage, systems automatically switch to the secondary data center without manual intervention. Which type of failover strategy is XYZ Corporation employing?
Active-active configuration
Automatic failover
Manual failover
Active-passive configuration
Answer Description
Automatic failover is when systems or services switch to a redundant or standby system automatically, typically without human intervention, in the event of a failure or service interruption. This type of failover is essential for mission-critical applications where downtime must be minimized. Manual failover, while it involves intentional human intervention to switch systems, would not apply as the question indicates the switch happens without manual intervention. Active-active and active-passive describe configurations of how systems are set up for redundancy, but they do not define the type of failover process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between automatic failover and manual failover?
How does automatic failover detect and activate the secondary data center?
What is the difference between active-active and active-passive configurations?
What technique should be used to restrict dedicated administrative access to only the necessary times when it is needed, thereby reducing the exposure time of elevated privileges?
Just-in-time permissions
Multifactor authentication
Security group assignments
Password vaulting
Answer Description
Just-in-time permissions restrict the timeframe during which administrative or elevated rights are granted to users, minimizing the potential for misuse of those privileges. By limiting access to only when it is required for a specific task and automatically revocating those permissions after a set time, the attack window is reduced. This prevents risks associated with standing privileged accounts, which could be exploited if compromised.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are just-in-time (JIT) permissions?
How are JIT permissions implemented in practice?
What are some benefits of using JIT permissions over traditional administrative accounts?
A company is transitioning to a permanent hybrid work model where employees will split their time between the office and home. To adapt its operational security (OpSec) program, which of the following actions is the MOST crucial for the security team to implement?
Developing and enforcing policies for secure remote access, home network configuration, and use of personal devices.
Strengthening the physical access controls for the on-premises data center.
Decommissioning all on-premises servers in favor of a cloud-only infrastructure.
Mandating that all employees attend quarterly security briefings in person at the corporate headquarters.
Answer Description
The correct answer is to develop and enforce policies for secure remote access, home network configuration, and the use of personal devices. In a hybrid model, the traditional security perimeter of the office is dissolved. Employees connect from various networks and may use personal devices, creating new risks. Establishing clear policies for remote access (e.g., via VPN with MFA), guiding users on securing their home Wi-Fi, and setting rules for Bring Your Own Device (BYOD) are the most critical steps to extend operational security to the new working environment. Strengthening data center physical security is important but does not address the primary risks of a distributed workforce. Mandating in-person briefings is impractical for a hybrid model and less effective than addressing the technical security gaps. Decommissioning on-premises servers is a major architectural decision, not a direct or immediate OpSec response to a hybrid work model.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is VPN and how does it enhance security for remote access?
Why is securing home Wi-Fi important for hybrid work models?
What is BYOD, and how should organizations manage its risks?
An organization's network has been compromised with software that appeared legitimate but has provided attackers with unauthorized access. Which of the following BEST describes the type of malware used in this scenario?
Virus
Trojan
Ransomware
Spyware
Answer Description
The correct answer is 'Trojan.' A Trojan is a type of malware that disguises itself as legitimate software. Attackers use Trojans to gain unauthorized access to systems by tricking users into loading and executing the malware on their systems. While the other options are also types of malware, they do not describe software that appears legitimate to gain unauthorized access. For instance, 'Ransomware' is designed to encrypt files and demand a ransom for the decryption key, 'Virus' attaches itself to legitimate software and spreads to other programs, and 'Spyware' typically aims to gather information without the user's knowledge. The key distinction for a Trojan is its disguise as legitimate software to perform malicious activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a Trojan differ from other types of malware like ransomware or viruses?
What are some common ways Trojans get delivered to a victim's system?
What steps can organizations take to defend against Trojans?
You have joined a new enterprise as a member of the IT Security team. During on boarding you receive two computers, one with access to highly confidential systems and one with access to less critical data and the internet. You cannot send data or documents from one network to the other and have to manage separate credentials for each. What concept best defines this approach?
Air gap
VPN
Data aggregated network segmentation (DANS)
Physical de-segmentation
Answer Description
This setup is best known as an air gap. In network an air gap means two or more networks are physically separated from each other to ensure no data can traverse from one to the other. Generally if a network is so critical it requires an air gap it will be a completely stand alone network with no access to other networks and especially the internet. A true air gap is not common in most businesses, but some known examples are government or military networks, highly critical infrastructure networks like nuclear power plant controls and financial systems like stock exchanges.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an air gap in network security?
Why are air gaps used in highly critical systems?
How does an air gap differ from network segmentation?
An organization needs to apply a critical security patch that may disrupt services. Which business process should be followed to ensure minimal impact on operations?
Deploy the update while ensuring it does not adversely affect current operations.
Schedule the update during a designated timeframe after conducting an impact analysis.
Apply the update at a time when it can be closely monitored for any issues.
Notify users and install the update with consideration of potential disruption.
Answer Description
Scheduling the update during a designated timeframe after conducting an impact analysis is the best approach. Conducting an impact analysis allows the organization to identify potential risks and understand how the patch may affect operations. Scheduling the update during a designated timeframe, such as a maintenance window, ensures that the patch is applied when it will cause the least disruption to business activities.
Applying the update at a time when it can be closely monitored is important, but without an impact analysis and proper scheduling, it may still lead to unexpected issues and operational disruptions.
Notifying users and installing the update with consideration of potential disruption shows consideration for stakeholders, but without a thorough impact analysis and scheduled timeframe, it may not effectively minimize the impact on operations.
Deploying the update while ensuring it does not adversely affect current operations is ideal, but without conducting an impact analysis and proper scheduling, it's challenging to guarantee that operations won't be affected.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an impact analysis in the context of security patches?
What is a maintenance window, and why is it important for patch management?
How does proper scheduling minimize risks when applying security patches?
An organization mandates that all employees use smart cards for secure access to the building. However, a group of contractors does not have smart cards due to administrative delays. What is the BEST action the organization can take to ensure these contractors can access the building securely?
Allow contractors to follow employees through secure entrances
Provide temporary access badges to the contractors
Exempt the contractors from access controls until they receive smart cards
Provide a shared access key for the contractors to use
Answer Description
Issuing temporary access badges to the contractors acts as a compensating control, substituting for the primary control of smart cards. The temporary badges could use a barcode, or have a picture and name of the individual that can be verified by security personnel. This allows secure access while maintaining security protocols. Other options either do not address the immediate need or compromise security standards.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a compensating control in security?
How do temporary access badges maintain security?
Why is it insecure to allow shared access keys for contractors?
A development team seeks a method to deploy applications in a lightweight, portable manner that ensures consistency across multiple environments. Which of the following technologies allows them to package applications with their dependencies in isolated environments?
Serverless computing
Virtualization
Containerization
Microservices
Answer Description
Containerization enables developers to package applications along with all their dependencies into isolated units called containers. This approach ensures that the application runs consistently regardless of the environment, enhancing portability and security by isolating applications from one another. Virtualization, while also providing isolation, involves creating full virtual machines with their own operating systems, which is more resource-intensive. Microservices refer to an architectural style that structures an application as a collection of loosely coupled services, focusing on design rather than deployment. Serverless computing allows developers to build and run applications without managing the underlying infrastructure but does not involve packaging applications with dependencies for consistency across environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is containerization in simple terms?
How is containerization different from virtualization?
What are some popular containerization tools?
A large multinational corporation is experiencing a persistent wave of cyber-attacks characterized by website defacements and data leaks. These incidents are accompanied by messages expressing opposition to the corporation's involvement in various international projects. What type of threat actor is most likely responsible for these activities?
Nation-state
Insider threat
Hacktivist
Organized crime
Answer Description
The correct answer is Hacktivist. Hacktivists are often motivated by philosophical or political beliefs, which lead them to target organizations or governments that they perceive as acting against their values or agendas. The nature of these attacks, including website defacements and public message spreads, are typical of hacktivist groups that aim to broadcast a political message or to create awareness about their cause. The other options listed do not align as closely with the details given.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What distinguishes a hacktivist from other types of threat actors?
Why is an insider threat not the correct answer in this scenario?
How do hacktivist tactics differ from those used by nation-states?
An organization requires administrators to authenticate to a dedicated server before accessing critical systems within a secure network segment. Which of the following network appliances is being used to enforce this security measure?
Load balancer
Proxy server
Router
Jump server
Answer Description
A jump server is a specially configured server that administrators must use as a gateway to access secure systems, providing controlled and monitored access. This enhances security by limiting direct access to critical systems. A proxy server acts on behalf of clients to access resources on other servers but doesn't enforce administrator authentication for internal systems. A load balancer distributes network traffic across multiple servers to optimize resource utilization but doesn't control administrative access. A router directs data packets between networks based on destination addresses but doesn't manage authentication for administrators accessing secure systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a jump server and how does it enhance security?
How is a jump server different from a proxy server?
Why is a load balancer not suitable for controlling administrative access?
An employee in the finance department receives an email from the CEO asking for immediate review of an attached document labeled 'Financial_Report_2023.xls'. The employee was not expecting any reports today. What potential threat could this file pose if the employee fails to take proper security measures before opening it?
The attachment is likely a template for future financial reports and opening it would set a new standard format.
Opening the file will automatically archive older financial reports for efficiency purposes.
The file may contain malicious code that can execute upon opening, compromising the integrity of the employee's system.
The file could be a duplicate of a file already present on the network, leading to data redundancy.
Answer Description
The scenario describes a common social engineering tactic known as pretexting, where an attacker fabricates a scenario to lure the victim into performing an action they shouldn't. The file 'Financial_Report_2023.xls' could contain a macro or exploit that, once opened, could execute malicious code on the user's system, leading to potential data exfiltration or other security incidents. This threat could materialize if macros are enabled or the file exploits a known vulnerability within the spreadsheet software. The other options are potential outcomes or states of a file but do not describe the immediate threat that an unexpected, unsolicited file could pose.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a macro and how can it be used maliciously in a file?
What is pretexting, and why is it a common social engineering tactic?
What security measures should employees take before opening unexpected email attachments?
What is the role of guard rails in an automated security environment?
Guard rails define boundaries to ensure automated tasks do not compromise security or compliance.
Guard rails are automated scripts that handle security incidents without human intervention.
Guard rails are tools for monitoring network traffic and alerting on suspicious activities.
Guard rails refer to the physical security measures used to protect hardware in a data center.
Answer Description
Guard rails in an automated security environment are pre-defined rules or policies that provide boundaries within which automated tasks can operate. They prevent the automated systems from executing tasks that could lead to security vulnerabilities or compliance issues. By setting these parameters, organizations can ensure that automation does not inadvertently cause harm or deviate from expected security practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are guard rails important in security automation?
How are guard rails implemented in an automated security environment?
Can guard rails be customized for individual organizations?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.