CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
What benefit does an organization's focus on the well-being and longevity of its workforce have, particularly in the context of maintaining secure automated systems?
Increase in software licensing costs
Decrease in the need for user training
Reduction in operational risks
Expansion of the organization's service portfolio
Answer Description
The correct answer is 'Reduction in operational risks.' Skilled employees who are well-versed in the organization's automated security systems contribute significantly to the maintenance and improvement of these systems. Retaining such employees can lead to a reduction in operational risks, as their expertise helps ensure that security measures are effectively implemented and managed. Experienced staff are also less likely to make errors that could lead to security breaches. The wrong answers do not directly relate to the impact of employee skills and experience on the security of automated systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do skilled employees help reduce operational risks in automated systems?
What specific skills should organizations look for in employees to maintain secure automated systems?
What are some potential consequences of having unskilled employees managing automated security systems?
Which of the following BEST describes how a perimeter security gateway (such as a firewall) handles network traffic?
It automatically encrypts all packets that pass through, eliminating the need for VPNs.
It forwards traffic originating from inside the network without inspection if trusted ports are used.
It inspects traffic in both inbound and outbound directions and can enforce policy on either.
It inspects only inbound traffic and cannot filter outbound connections.
Answer Description
Modern perimeter gateways perform stateful inspection of traffic flowing in BOTH directions. Ingress rules stop unwanted or malicious traffic from entering the network, while egress rules restrict or log outbound connections to enforce policy and prevent data exfiltration. Gateways do not automatically encrypt every packet, nor do they bypass inspection simply because traffic originates from the internal network or uses a well-known port.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a gateway in networking?
How do gateways enforce security policies for outbound traffic?
What are common misconceptions about gateway functions?
Which authentication protocol uses a ticket-granting service as part of its mechanism to provide access to resources across a network?
Simple Sign-On
Network Access Token
Direct Access
Kerberos
Answer Description
This protocol is known for using a trusted third-party ticket-granting service to provide secure access to resources. It mitigates the risk of eavesdropping and replay attacks by avoiding the need to transmit passwords over the network. Instead, a client requests an access ticket from the ticket-granting service, which if granted, allows the client to access the desired service using that ticket. In contrast, Direct Access grants remote access to internal networks over IPv6 transitions, Simple Sign-On represents a one-time authentication process across multiple systems, which is not particularly related to ticket-granting, and Network Access Token is a made-up term not associated with a real-world authentication protocol.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a ticket-granting service in Kerberos?
How does Kerberos mitigate eavesdropping and replay attacks?
What are some alternatives to Kerberos for network authentication?
During an incident response investigation, analysts discover Cyrillic comments and Russian-language debug paths embedded in the source code of malware used in a sophisticated breach. Which of the following BEST explains why this evidence alone cannot be taken as definitive proof that a Russian government agency conducted the attack?
Nation-state attackers always encrypt their production builds, so any readable strings must come from reuse by third-party developers.
Russian is the default language in most compiler environments, so these markers are inserted automatically during compilation.
Threat actors can deliberately embed linguistic and cultural markers as false flags to mislead investigators.
Open-source libraries automatically remove national language clues, so variable names are never reliable for attribution.
Answer Description
Attribution in cybersecurity is notoriously difficult because attackers can intentionally plant misleading evidence. Linguistic and cultural artifacts-such as comments, debug paths, or variable names written in a specific language-may be genuine, but they can also be inserted deliberately as false flags to divert suspicion toward another actor or nation-state. Without corroborating technical indicators, intelligence, or context, such markers are suggestive at best and never conclusive proof of government-sponsored espionage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are false flags in cyberattacks?
Why is attribution in cybersecurity considered complex?
What is corroborative intelligence in the context of cyberattacks?
Which metric is most important for determining the maximum period that a business process can afford to be offline during the recovery phase after a significant disruptive event?
Redundancy Strategy
Availability
Recovery Time Objective
Service Level Agreements
Answer Description
The metric in question is the Recovery Time Objective, which sets the maximum amount of time that a process can be down after a disruption before significantly impacting the organization. It is essential for creating effective disaster recovery strategies. While redundancy is a strategy that may help achieve a lower RTO by having backup systems, it is not a metric. Availability represents the proportion of time a system is operational, and Service Level Agreements establish the expected performance and availability standards between providers and clients, but neither directly defines the maximum tolerable downtime after a disruption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Recovery Time Objective (RTO)?
How does RTO differ from other recovery metrics?
Why is setting an appropriate RTO crucial for a business?
A development team is implementing a 'shift-left' security strategy to identify vulnerabilities early in the software development lifecycle (SDLC). The team wants to analyze the application's source code for security flaws, such as potential SQL injection and buffer overflows, without executing the program. Which of the following techniques should the team use?
Web application firewall (WAF)
Static Application Security Testing (SAST)
Fuzzing
Dynamic Application Security Testing (DAST)
Answer Description
Static Application Security Testing (SAST) is the correct technique because it analyzes an application's source code or binaries for security vulnerabilities without running the program. This allows developers to find and fix issues like SQL injection and buffer overflows early in the SDLC, which is the core principle of 'shift-left' security. Dynamic Application Security Testing (DAST) analyzes applications in their running state, while fuzzing involves providing invalid or unexpected data to a running application to see if it crashes. A web application firewall (WAF) is a network security control that protects web applications from attacks at the network edge; it does not analyze source code.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common security vulnerabilities that static analysis tools can detect?
How do static analysis tools differ from dynamic analysis tools?
Can static analysis tools replace manual code reviews?
An employee in the finance department of a multinational corporation has just resigned after being passed over for a promotion. The next day, the company's network experiences an unauthorized transfer of proprietary financial data to an external server. Which motivation is most likely to be the cause behind this incident?
Espionage
Philosophical/political beliefs
Revenge
Financial gain
Answer Description
Revenge is often a motivation for employees who feel wronged or slighted by their organization. In this scenario, the employee's resignation following a missed promotion and the immediate subsequent data exfiltration suggest a revenge-motivated insider threat. Other motivations like financial gain or data exfiltration for espionage purposes are less direct in linking the disgruntled employee's actions to the incident. Philosophical/political beliefs is unlikely the motive in this context, as the act of retaliation is personal rather than ideological.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common signs of insider threats in a workplace?
How can organizations prevent insider threats?
What are some psychological factors that lead to revenge behavior in the workplace?
What term is used to describe an environment where there is no connection—wireless or wired—to any external network, guaranteeing a high level of security for sensitive data?
Serverless
Microservices
Air-gapped
Virtualized
Answer Description
An air-gapped environment refers to a security measure that involves isolating a computer or network and preventing it from establishing an external connection. This means the system is physically segregated from unsecured networks, including the internet and local area networks. This isolation provides a strong barrier against unauthorized access and cyber attacks, as there is no pathway for data to flow in or out of the system electronically.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the benefits of using an air-gapped environment?
How is data transferred in an air-gapped environment?
What types of organizations commonly use air-gapped networks?
A security engineer needs to protect sensitive customer records that are stored in a database on an on-premises file server. Which of the following controls would BEST safeguard the data if the physical disks are stolen from the server?
Install a host-based intrusion detection system (HIDS) on the server.
Configure Transport Layer Security (TLS) for all web applications on the server.
Implement full-disk encryption using AES-256.
Place the database server in a separate management VLAN.
Answer Description
Encrypting the entire drive (or the specific data volume) with a strong algorithm such as AES-256 renders the stored data unreadable without the corresponding decryption key. Controls like TLS focus on data in transit, VLAN segmentation limits network exposure but does not cryptographically protect the files themselves, and a host-based IDS only detects suspicious activity. Therefore, full-disk (or volume) encryption is the most effective measure to protect data at rest on the stolen disks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data at rest?
What are encryption keys?
What is the importance of encrypting data at rest?
Which tool helps manage and secure privileged accounts by allowing for the temporary issuing of administrative rights and automatically revoking them after a set time period or task completion?
Password managers
Just-in-time permissions
Password vaulting
Ephemeral credentials
Answer Description
Just-in-time permissions are used by privileged access management tools to provide administrative rights on a temporary basis, which are automatically revoked after a set time period or once the designated task has been completed. This reduces the risk of unauthorized access from stale accounts or the misuse of long-standing permissions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are privileged accounts?
How do Just-in-time permissions enhance security?
What is privileged access management (PAM)?
A marketing firm has recently hired an analyst who will be working with proprietary client data. What is the most critical action to perform from a security standpoint as part of the onboarding process for this new role?
Implement role-based access control to proprietary and sensitive client data systems.
Issue security badges for physical access to the firm's offices and client meeting rooms.
Provide them with a company email address and user profile for day-to-day communication and tasks.
Ensure completion of a general training program that includes corporate culture and policies.
Answer Description
Implementing role-based access control is critical to ensuring that the new analyst has access only to the information necessary to perform their specific job functions, which maintains the principle of least privilege and supports organizational security. Providing a company email or user profile is part of standard onboarding but does not address security concerns regarding access to confidential information. Issuing security badges allows for physical access but is not sufficient for regulating access to digital resources. The completion of general training, while important for overall employee integration, does not directly concern the regulation of access to sensitive data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is role-based access control (RBAC)?
What does the principle of least privilege mean?
Why is it important to protect proprietary client data?
An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?
Enforcing multi-factor authentication
Applying network segmentation
Encrypting all sensitive files
Implementing role-based access control
Answer Description
Implementing role-based access control (RBAC) allows the organization to assign permissions to users based on their job responsibilities. This ensures that employees have access only to the resources necessary for their tasks, reducing unauthorized access to sensitive files. Encrypting files protects data confidentiality but doesn't prevent authorized users from accessing data beyond their responsibilities. Enforcing multi-factor authentication strengthens login security but doesn't control access permissions. Applying network segmentation divides the network but doesn't directly manage user access to specific files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is role-based access control (RBAC)?
How does RBAC improve security in an organization?
What are some potential challenges of implementing RBAC?
What is the primary function of the RADIUS protocol when it is implemented on a network?
Distributing IP addresses to client devices
Load balancing traffic between servers
Facilitating the handshaking process in a TLS session
Centralizing control over who can connect to and use network services
Answer Description
The correct answer is "Centralizing control over who can connect to and use network services" because RADIUS is designed to supply centralized authentication, authorization, and accounting (AAA) for users seeking access to network resources. "Facilitating the handshaking process in a TLS session" is incorrect because that task is handled by the TLS protocol during secure communications setup. "Distributing IP addresses to client devices" is a function of the Dynamic Host Configuration Protocol (DHCP), not RADIUS. "Load balancing traffic between servers" is handled by dedicated load-balancing solutions rather than by RADIUS.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RADIUS stand for, and how does it work?
How does RADIUS enhance network security?
What are the differences between RADIUS and TACACS+?
As a security administrator, you have been asked to implement a mechanism that can discover unauthorized access to company resources and alert the security team when such events occur. Which type of security control should you primarily focus on deploying?
Compensating control
Corrective control
Directive control
Preventive control
Deterrent control
Detective control
Answer Description
Detective controls are designed to identify and record unauthorized activities or intrusions, including any incident that has an impact on the security of information assets. These controls do not prevent or deter the action but instead, detect and report them. For this scenario, implementing a detective control such as an intrusion detection system (IDS) would be the appropriate choice to discover unauthorized access and alert the security team.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of detective controls?
How do intrusion detection systems (IDS) work?
What is the difference between detective controls and preventive controls?
Data stored on a SAN and not being processed is in which state?
Data at rest
Data in motion
Data in use
Data in transit
Answer Description
Data that isn’t active and is on a storage media is considered data at rest.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'data at rest' specifically refer to?
Why is data at rest considered less vulnerable than data in transit?
What are the common security measures for protecting data at rest?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.