CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A financial institution wants to reduce the risk of sensitive customer data exfiltration by employees. Which of the following would be the MOST effective measure to implement?
Enforcing the use of strong encryption protocols for data at rest.
Enabling biometric authentication on all data systems.
Segmenting the internal network based on departmental functions.
Disabling unused physical and logical service ports company-wide.
Implementing monitoring and blocking of suspicious data transfers.
Answer Description
Setting up a system that monitors, detects, and blocks potentially unauthorized data transmissions can dramatically lower the likelihood of sensitive information being leaked or transferred outside the company by an insider with legitimate access. While biometric authentication adds a layer of security, it does not prevent data exfiltration by authenticated users. Disabling unused service ports and enforcing strong encryption enhance security but are not directly effective in monitoring or preventing the transfer of sensitive data from insiders. Segmenting the network can reduce the risk of widespread internal access, but it is not specifically aimed at preventing data exfiltration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data exfiltration?
How does monitoring and blocking of data transfers work?
What are strong encryption protocols for data at rest?
A healthcare organization relies on specialized equipment that operates on a legacy system which cannot be patched due to vendor abandonment. To maintain the highest level of security, what should be the organization's FIRST step in mitigating the risks associated with the inability to patch this system?
Deploy an additional firewall specifically for the legacy system
Scheduling more frequent vulnerability scans
Applying antivirus software updates more frequently
Network segmentation
Answer Description
The correct answer is 'Network segmentation'. This practice would isolate the legacy system from the rest of the network, reducing the potential impact of a vulnerability being exploited. While other options like intrusion detection systems and replacement could also be considered, they do not immediately address the risk of the legacy system being compromised. Network segmentation is a straightforward mitigation step that can be applied without requiring the removal of critical, yet non-patchable, equipment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation and how does it work?
Why is it important to isolate legacy systems in a healthcare environment?
What are some other security measures that can complement network segmentation?
Regular auditing of user permissions and access rights primarily belongs to which type of security control?
Preventive control
Deterrent control
Detective control
Corrective control
Answer Description
Auditing gathers evidence after the fact by reviewing log and permission data to uncover unauthorized access or policy violations. Because it identifies issues that have already occurred, its chief purpose is detection, not prevention, correction, or deterrence. Therefore, it is categorized as a detective control.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are preventive and detective controls?
Can you give examples of preventive controls?
How does regular auditing help in identifying security issues?
Which of the following best represents the role of endpoint protection software as a system hardening technique in an organization's cybersecurity strategy?
To backup data periodically and ensure disaster recovery for individual endpoint devices
To manage user permissions and access control lists across the network
To optimize the performance and speed of endpoint devices for better user experience
To provide comprehensive security measures, such as antivirus and personal firewall capabilities, to individual devices within a network
Answer Description
Endpoint protection software's role as a system hardening technique is to enhance the security of individual devices within a network by providing a combination of various security measures against threats such as malware, exploits, and unauthorized access attempts. It typically includes functionalities like antivirus, antimalware, and personal firewalls. The correct answer encapsulates these capabilities. The incorrect answers either misrepresent the scope of endpoint protection or attribute unrelated functions to it.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common features of endpoint protection software?
How does endpoint protection software differ from traditional antivirus programs?
Why is endpoint protection important for organizational cybersecurity?
An organization that handles top-secret defense research maintains a database server containing classified schematics. To comply with policy, the server must be completely unable to send or receive data over any wired or wireless network, thus preventing remote compromise or accidental data exfiltration. Which strategy best satisfies this requirement?
Enabling a host-based firewall
Deploying an Intrusion Detection System (IDS)
Implementing an air-gapped system
Using network segmentation with VLANs
Answer Description
An air-gapped system is physically isolated from all other networks, including the Internet. Because no network interfaces remain connected, data cannot enter or leave electronically, providing maximum protection for highly sensitive assets. A host-based firewall, VLAN segmentation, or an IDS can restrict or monitor traffic, but all still depend on an active network connection and therefore cannot guarantee total isolation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an air-gapped system and how does it enhance security?
What are the limitations of using a host-based firewall?
How does network segmentation with VLANs work, and what are its shortcomings?
Which authentication factor category includes using a user's geographic location to grant access to a system?
Somewhere you are
Something you are
Something you know
Something you have
Answer Description
The 'Somewhere you are' factor relates to the use of geographic location as part of the authentication process. Typically, this involves technologies such as GPS or IP address location services to verify the user's current physical location. This kind of authentication is particularly useful for enforcing location-based access policies, such as allowing access to a corporate network only from within a secure physical office or predefined safe geofenced areas. Other answers, 'Something you know', 'Something you have', and 'Something you are', refer respectively to knowledge factors like passwords, possession factors like smart cards or tokens, and inherence factors like biometrics, all of which are separate from the user's location.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of location-based authentication methods?
How do geofencing and IP geolocation differ in this context?
Why is location-based authentication important in security?
A country's primary power grid and water treatment facilities have experienced a series of sophisticated, coordinated cyber attacks aimed at causing widespread service disruption. Which of the following threat actors is MOST likely responsible for this type of attack?
Insider threat
Hacktivist
Organized crime
Nation-state
Answer Description
The correct answer is 'Nation-state'. Nation-state actors possess high levels of sophistication, resources, and funding, and their motivations often include espionage, political gain, and disrupting the critical infrastructure of other nations. Attacks on power grids and water facilities are characteristic of cyber warfare campaigns intended to cause significant societal and economic harm.
- Organized crime is primarily motivated by financial gain and is more likely to use ransomware or steal data for extortion rather than cause widespread service disruption for its own sake.
- A hacktivist is typically motivated by political or social beliefs and usually conducts less sophisticated attacks like website defacement or DDoS attacks against specific organizations, lacking the resources for a large-scale infrastructure attack.
- An insider threat acts from within an organization, and while potentially disruptive, is less likely to orchestrate a widespread, coordinated attack on national critical infrastructure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are nation-state actors in cybersecurity?
What is critical infrastructure?
What are some examples of attacks on critical infrastructure?
Which type of security control is primarily used to identify unauthorized access or activities on a network?
Intrusion Detection System (IDS)
Security Policies
Backup Systems
Firewalls
Answer Description
Detective controls are designed to identify and record unauthorized activities or access within a system or network. Intrusion Detection Systems (IDS) are a perfect example of detective controls since their main purpose is to detect potential security breaches, log security events, and alert systems or network administrators. While firewalls are used for prevention, and security policies guide user behavior, they are not primarily used to detect unauthorized activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Intrusion Detection System (IDS)?
What is the difference between an IDS and a firewall?
What are detective controls, and why are they important?
Which network setup involves isolating a system from external network connections to enhance security?
Virtual LAN (VLAN)
Split tunneling
Software-defined network (SDN)
Air-gap
Answer Description
An air-gap refers to a network security measure where a system is physically isolated from unsecured networks, preventing external communication. This isolation enhances security by eliminating pathways that could be exploited by attackers. In contrast, a Virtual LAN (VLAN) and a software-defined network (SDN) provide logical network segmentation but do not physically isolate systems. Split tunneling allows simultaneous access to secure and unsecured networks, which can introduce security risks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key benefits of using an air-gap for security?
How do VLANs differ from air-gapped networks in terms of security?
What are scenarios where air-gapped networks are commonly implemented?
During disposal of storage media, due to regulatory requirements some of the data is required to be saved for a certain period of time. This is an example of what?
Sanitization
Data retention
Certification
Destruction
Answer Description
There are times when certain data is required to be kept for a certain period of time due to legal, regulatory or policy reasons. There are also requirements pertaining to when data isn’t supposed to be kept. This is all referred to as data retention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are regulatory requirements related to data retention?
What is the difference between data retention and data destruction?
What are some common practices for managing data retention?
An organization stores highly sensitive financial records in an on-premises relational database. Role-based access control (RBAC) already limits each employee to only the tables required for their job duties. Security analysts are concerned that an attacker could still read the data if they steal a legitimate user's password. Which of the following additional controls would BEST mitigate this risk?
Increase the minimum password length for all database users from 8 to 12 characters.
Disable verbose SQL error messages returned to clients.
Require multi-factor authentication (MFA) for all database logins.
Enable full-disk encryption on the database server.
Answer Description
RBAC restricts what an authenticated account can see, but if the account credentials are stolen the attacker gains the same database access. Requiring multi-factor authentication (MFA) adds a second, independent factor the attacker is unlikely to possess, making stolen passwords alone insufficient. The other options improve security but do not address the stolen-credential threat as effectively: longer passwords still fail once the password is known, full-disk encryption protects only when the system is powered off, and suppressing SQL errors mainly reduces information disclosure during reconnaissance rather than blocking authenticated access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are role-based permission settings?
Why is encryption necessary for protecting financial records?
What does a defense-in-depth approach entail?
A development team seeks a method to deploy applications in a lightweight, portable manner that ensures consistency across multiple environments. Which of the following technologies allows them to package applications with their dependencies in isolated environments?
Virtualization
Microservices
Serverless computing
Containerization
Answer Description
Containerization enables developers to package applications along with all their dependencies into isolated units called containers. This approach ensures that the application runs consistently regardless of the environment, enhancing portability and security by isolating applications from one another. Virtualization, while also providing isolation, involves creating full virtual machines with their own operating systems, which is more resource-intensive. Microservices refer to an architectural style that structures an application as a collection of loosely coupled services, focusing on design rather than deployment. Serverless computing allows developers to build and run applications without managing the underlying infrastructure but does not involve packaging applications with dependencies for consistency across environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are containers in containerization?
How does containerization enhance security?
What are the benefits of using containerization compared to virtualization?
An organization publishes an acceptable-use policy that outlines how employees may access and utilize company resources. Which type of security control does this policy represent?
Detective control
Preventive control
Compensating control
Directive control
Answer Description
Written policies that outline permitted or required behavior are directive controls because they provide explicit guidance to users and systems. Detective controls identify incidents, preventive controls block them from occurring, and compensating controls provide alternatives when primary controls are not feasible. Therefore, the acceptable-use policy exemplifies a directive control.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components of a security policy?
Why is employee training important for security policies?
What is an acceptable use policy (AUP)?
What type of backup is a copy of the entire state of a system and it can be used to restore that system and other similar systems to that exact state/configuration?
Differential
Incremental
Full
Image
Answer Description
A system image is a copy of the entire state of a system. That image can be used as a way to restore the system it came from to that exact state or it can be copied onto other similar system to bring them all to a uniform state.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a system image backup?
How does a system image differ from other types of backups?
When would I need to use a system image backup?
You are the resident IT within your family. While relaxing and enjoying a family Thanksgiving dinner your sweet old Grandmother mentions that Microsoft called her cell phone and helped her with a virus on her computer. You explain to her that Microsoft does not call people directly to help with computer issues and that she was likely targeted by a malicious attacker. You scan her computer for viruses and find several. Your poor sweet old Grandmother was a victim of what type of attack?
Spear phishing
Vishing
Tailgaiting
phonejacking
Answer Description
Gran' was a victim of a voice phishing or vishing attack. This is the term used when an attacker contacts the victim via phone and attempts to steal personal information or by tricking the user to install malware on their computer. They may claim to be from a valid tech support company or vendor such as Microsoft or as a bill collector from a local utility company or anything in between.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is vishing and how is it different from phishing?
How can I protect myself against vishing attacks?
What are some signs that I am experiencing a vishing attack?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.