CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Your coworker identified a vulnerability for a 3rd party software solution hosted on premise. The coworker is out sick today and has asked you remediate this issue as quickly as possible. You have identified a patch to fix the security vulnerability from the vendor's official website. What step should you take NEXT?
Begin monitoring for related incidients
Install the patch immediately and inform affected users
Start the incident response process
Submit a change request based on the companies change management processes
Answer Description
Changes, even urgent ones, should be documented and approved based on company policy. This is typically called something like a "Change Request" or CR, or a "Request For Change" or RFC. This is the first step in deploying updates, configuration changes, etc.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Change Request (CR) or Request For Change (RFC)?
Why is it important to follow change management processes when applying patches?
What are the common steps in the incident response process?
A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?
Recovery Time Objective (RTO)
Reconnaissance
Annualized Loss Expectancy (ALE)
Mean Time to Repair (MTTR)
Answer Description
The Recovery Time Objective (RTO) specifies the target amount of time a service provider aims to restore a business process after a disruption and is therefore the primary focus when ensuring timely restoration of services as per the service-level agreement (SLA). Mean Time to Repair (MTTR) refers to the average time to repair a broken component, which, although important, is not specific to service-level targets for business processes. Annualized Loss Expectancy (ALE) is used in risk assessment and financial impact analysis, not in SLAs. Reconnaissance is related to information gathering, typical in security assessments like penetration testing, and is unrelated to SLAs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does Recovery Time Objective (RTO) mean?
How is RTO different from Mean Time to Repair (MTTR)?
What is a Service-Level Agreement (SLA) and why is it important?
When a hypervisor reallocates previously used memory pages or disk blocks to a different virtual machine without securely wiping them first, which specific security risk does this resource-reuse vulnerability create?
Denial-of-service caused by excessive CPU scheduling of VMs
Privilege escalation from the guest VM to the host hypervisor
Bypass of network segmentation through a virtual-switch flaw
Data remanence that could expose residual information to another VM
Answer Description
Data remanence is the primary risk. If RAM or storage blocks are not sanitized before being reassigned, residual information from the previous VM can persist. A new VM might be able to read that leftover data, exposing sensitive information. While privilege escalation, denial-of-service conditions, and virtual-switch misconfigurations are genuine virtualization issues, none of them directly stem from reusing uncleared resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hypervisor and how does it work?
What is data remanence and why is it a concern in virtualization?
How can hypervisors ensure proper resource sanitization?
What does RPO define in a disaster recovery strategy?
The time to restore IT systems after a disruption.
The amount of data an organization can afford to lose, measured in time.
The procedures used to handle security incidents.
The strategies implemented to prevent unauthorized access to systems.
Answer Description
RPO (Recovery Point Objective) defines the amount of data an organization can afford to lose, measured in time. This helps in determining the frequency of data backups to ensure data loss stays within acceptable limits. The other options relate to different aspects of disaster recovery, such as restoration time, incident response procedures, and access prevention strategies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RPO mean, and how is it calculated?
How does RPO differ from RTO in disaster recovery planning?
What are the best practices for setting an effective RPO?
Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?
To ensure compliance with specific legal requirements that may not be covered by national or global standards.
To simplify the security program management by adhering to broader compliance laws.
To apply universal standards of cybersecurity that are recognized globally.
To avoid the need for customizing security measures for different company branches.
Answer Description
An organization needs to comply with local and regional regulations to ensure that they are not violating any laws that may be specific to the jurisdictions they operate in. Not understanding these local nuances could lead to legal issues, such as fines or sanctions. For example, certain regions may have specific requirements for data protection that differ from national laws, such as stricter privacy regulations that mandate data residency within the region. National and global standards, while essential, may not cover all aspects of the local regulatory environment, and universal standards do not typically exist for cybersecurity, hence the specificity of the correct answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of local and regional regulations that organizations need to be aware of?
How do local regulations differ from national and global standards in cybersecurity?
What are the potential consequences for not adhering to local regulations in a security program?
Which category of security controls focuses on establishing policies, procedures, and guidelines to manage security risks?
Operational Controls
Physical Controls
Managerial Controls
Technical Controls
Answer Description
Managerial controls are the correct answer because they involve establishing security policies, procedures, and guidelines to manage security risks. These controls are implemented at the management level and provide the framework for the overall security strategy. Technical controls, on the other hand, involve implementing and managing security technologies like firewalls and encryption. Operational controls focus on day-to-day operations and tasks, such as incident response and access controls. Physical controls protect physical assets and premises, such as using biometrics and surveillance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of Managerial Controls?
How do Managerial Controls differ from Technical Controls?
Can you explain the role of Operational Controls in cybersecurity?
Which policy should be established to define the proper behaviors and usage expectations for employees when interacting with the company's IT systems?
Change Management Policy
Information Security Policy
Acceptable Use Policy
Software Development Lifecycle Policy
Answer Description
An Acceptable Use Policy (AUP) outlines the appropriate behavioral expectations for users accessing and utilizing company IT assets, including internet and email use, software, and hardware. It is essential for maintaining security by informing users of their responsibilities and limiting risky behavior.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Acceptable Use Policy (AUP)?
Why is it important to have an AUP in place?
What kinds of behaviors are usually covered by an AUP?
Which password attack technique involves attempting access with a set of commonly used passwords on multiple user accounts to avoid account lockout policies?
Password spraying
Credential stuffing
Dictionary attack
Brute force attack
Answer Description
Password spraying is a technique used by attackers where they try common passwords against many different accounts to find a match. They do this without triggering the account's lockout policy as they do not make too many attempts on a single account. It differs from brute force attacks which generally try many password combinations on one account, potentially triggering lockout mechanisms.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is password spraying and how does it work?
What are some common passwords that attackers might use in a password spraying attack?
How does password spraying differ from other password attack techniques?
A company is preparing to deploy a new web application onto its cloud infrastructure. The security team is tasked with implementing a deployment strategy that ensures the highest level of security while maintaining efficiency. Which of the following deployment strategies BEST meets this requirement?
Implement automated deployment tools with pre-configured security checks integrated into the deployment pipeline
Carry out manual deployment with step-by-step security verification performed by the IT security staff
Use a phased deployment approach, gradually increasing the number of users while monitoring for security issues
Conduct scheduled deployment during off-peak hours with subsequent manual security post-checks
Answer Description
Using automated deployment tools with security checks integrated into the deployment pipeline provides the most secure and efficient deployment strategy. It leverages scripting and automated processes to enforce security baselines, apply configurations, and ensure that all steps are consistently followed for each deployment. Automation reduces the risk of human error and ensures that security controls are integrated throughout the deployment process. Manual deployment increases risk as it's more prone to errors and inconsistencies. Scheduled deployment may not address the immediate security needs of the environment, and phased deployment focuses more on functionality and user adaptation rather than security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are automated deployment tools?
What are integration security checks?
Why is reducing human error important in deployment?
Which of the following best describes the concept of 'Internet of Things' as it pertains to security architecture?
A framework for managing traditional IT infrastructure such as servers and desktops.
A centralized platform for deploying large-scale industrial control systems.
A software protocol that allows devices to communicate over the internet.
A network of interconnected devices that collect, exchange, and process data over the internet or other communication networks.
Answer Description
The term Internet of Things (IoT) refers to a network of physical objects that are equipped with sensors, software, and communication capabilities so they can connect to, exchange, and sometimes act on data with other devices and systems-usually over the internet or other networks. Choices that focus only on traditional IT infrastructure, a single software protocol, or centralized industrial platforms do not capture the defining elements of IoT: physical "things" and autonomous connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of IoT devices?
How does IoT impact security architecture?
What is the role of sensors in IoT?
What does the term 'resource provisioning' refer to in the context of securing computing resources?
The process of allocating and managing computing resources to users or systems according to security policies
The act of installing antivirus software on workstations and servers
The storage and classification of organizational data in accordance with established compliance requirements
The step-by-step methodology of responding to security incidents
Answer Description
Resource provisioning refers to the process of allocating and managing computing resources, like user accounts and permission sets, to users or systems in a way that aligns with organizational security policies. Incorrect answers might seem plausible because they involve similar processes, but they do not accurately describe the act of resource allocation and management as resource provisioning does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of computing resources involved in resource provisioning?
How do security policies influence the resource provisioning process?
What tools or technologies assist in the resource provisioning process?
An organization needs to ensure that encrypted data remains accessible even if an employee's cryptographic credentials are lost or become unavailable. Which of the following methods BEST achieves this objective?
Implementing key escrow
Applying key stretching techniques
Utilizing certificate revocation lists
Issuing digital certificates
Answer Description
Implementing key escrow involves securely storing copies of cryptographic keys with a trusted third party or designated authority. This allows the organization to recover encrypted data if the original keys are lost or inaccessible. Key stretching strengthens weak keys against brute-force attacks but does not help in recovering lost keys. Digital certificates associate public keys with user identities but do not provide a means for key recovery. Certificate Revocation Lists (CRLs) are used to revoke untrusted certificates and do not aid in data recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is key escrow?
What are the risks of using key escrow?
How does key stretching differ from key escrow?
During an audit of the company's disaster-recovery plan, the security administrator must recommend a backup technique that consumes the smallest amount of storage while backing up only data modified since the most recent full or incremental job. Which backup type should the administrator choose?
Differential backup
Incremental backup
Snapshot
Full backup
Answer Description
An incremental backup captures only the data that has changed since the last backup of any type-either full or incremental-so it typically requires the least storage space. A differential backup records all changes since the last full backup, so its size grows each day until another full backup occurs. A snapshot represents a point-in-time copy of a volume rather than a true change-based backup method. A full backup duplicates every selected file and therefore consumes the most storage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between incremental and differential backups?
What are the benefits of using an incremental backup strategy?
What is a snapshot backup and how does it differ from an incremental backup?
Which term best describes the ability of a system or component to be operational and accessible when required for use?
Load balancing
Scalability
High availability
Failover
Answer Description
High availability refers to systems that are dependable enough to operate continuously without failing for a long period of time. It is often measured by the uptime in the context of an annual percentage. The incorrect options, while related to system performance and design, do not specifically relate to the concept of being operational and accessible when required.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does high availability mean in practice?
How is high availability measured?
What are some common strategies to achieve high availability?
An organization's server room entry is secured solely by numerical access codes, which has recently led to heightened concerns about the method's vulnerability to systematic guessing attempts. To increase the difficulty for perpetrators attempting to gain unauthorized entry, which enhancement should be taken?
Enhancing video surveillance around the entry area.
Intermittent updates to numerical access codes.
Setting up an audible alert after multiple failed entry attempts.
Installing a biometric authentication system.
Answer Description
Employing a biometric authentication system increases security by requiring personal physical attributes, making it significantly more resistant to systematic guessing and unauthorized entry compared to numerical access codes. Updating numerical access codes intermittently can temporarily prevent unauthorized access but does not inherently improve resistance against a focused attack. An audible alert after a set number of failed attempts might deter but not prevent an intruder who can still continue to attempt access. Video surveillance, although useful for monitoring and recording, does not in itself prevent unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometric authentication systems?
What are the advantages of biometric systems over numerical codes?
How does an organization implement a biometric authentication system?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.