CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
During a routine security audit, the administrator discovers that two different archived log files produce the exact same SHA-1 hash value, even though their contents differ. Which type of cryptographic attack does this finding most likely indicate?
Birthday attack
Downgrade attack
Replay attack
Collision attack
Answer Description
A collision attack specifically targets the collision resistance property of a hash function: it tries to generate two distinct inputs that yield the same hash value. Discovering two different files with an identical digest is the textbook symptom of such an attack.
Why the others are wrong:
- Birthday attack: Although it exploits the birthday paradox to find a collision faster, it does not fit the scenario where a collision has already been observed.
- Downgrade attack: Forces parties to use a weaker algorithm or protocol version; it does not involve identical hashes for different inputs.
- Replay attack: Captures and reuses valid authentication data but does not manipulate hash functions or create identical digests.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a collision attack?
What are hash functions and how do they work?
What are some examples of hashing algorithms that can be vulnerable to collision attacks?
Which of the following is a physical control designed to allow visibility and detection of unauthorized entry while limiting the potential of physical confrontations?
Bollards
Mantrap
Surveillance cameras
Keypad door locks
Answer Description
Surveillance cameras are a common physical control used to provide visibility into the security of premises, allowing the detection of unauthorized or unusual activity without engaging in physical confrontations. They act as both a deterrent and a means to gather evidence. Bollards are designed to stop vehicles, not for surveillance purposes. Keypad door locks are access controls but do not necessarily provide visibility or detection of unauthorized entry. A mantrap controls access to secure areas but generally does not provide visibility of the area beyond its confines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main benefits of using surveillance cameras for security?
How do surveillance cameras support law enforcement investigations?
What are the limitations of surveillance cameras in physical security?
Which of the following options is considered a 'something you have' factor in multifactor authentication?
Security token
Password
Voice recognition
Fingerprint
Answer Description
'Security token' is the correct answer because it is a physical device that the user possesses and uses to gain access to an information system or secure area. In the context of multifactor authentication, 'something you have' refers to a physical object the user must possess, such as a smart card, a hardware token, or a phone with an OTP app. The incorrect options 'Fingerprint' and 'Password' are 'something you are' and 'something you know' factors, respectively, which do not fit the 'something you have' category. 'Voice recognition' is part of biometric authentication, which also falls under 'something you are' since it uses your unique biological characteristics for identification.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a security token?
What are other examples of 'something you have' factors?
What are the different categories of factors in multifactor authentication?
An organization wants to ensure that clients accessing their services can determine in real-time whether certificates are valid or not. Which of the following should the organization implement to enable real-time certificate validation by clients?
CSR
Self-signed certificates
OCSP
CRL
Answer Description
Implementing the Online Certificate Status Protocol (OCSP) allows clients to check the validity of certificates in real-time by querying the certificate authority's OCSP responder. This provides immediate feedback on whether a certificate is valid or has been revoked. A Certificate Revocation List (CRL) is a list of revoked certificates that clients can download, but it is updated periodically and may not reflect the most recent revocations, leading to potential delays in detection. Self-signed certificates are not issued by a trusted certificate authority and do not facilitate real-time validation by clients. A Certificate Signing Request (CSR) is a request sent to a certificate authority to obtain a new certificate and is unrelated to checking the validity of existing certificates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is OCSP and how does it work?
What is the difference between OCSP and CRL?
What are self-signed certificates and their limitations?
A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?
AES
RSA
RC4
Blowfish
Answer Description
RSA uses mathematically linked public and private keys to encrypt or sign data, making it an asymmetric algorithm. The other listed algorithms-AES, Blowfish, and RC4-are all symmetric ciphers that rely on the same shared key for both encryption and decryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is asymmetric cryptography?
How does RSA work?
What are some other asymmetric algorithms?
Why is it crucial for an organization to ensure the availability of patches for its systems and software?
To change the software vendor's terms and conditions
To ensure systems are constantly upgraded with new features
To increase the software lifecycle without additional costs
To correct security vulnerabilities and other flaws to prevent exploitation
Answer Description
Patches are essential for correcting security vulnerabilities and other bugs within systems and software. Timely application of patches is necessary to protect against exploitation by cyber threats, which can compromise the integrity, availability, and confidentiality of organizational data and resources. Organizations need to maintain awareness of patch releases and implement them to mitigate vulnerabilities as soon as possible.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are patches and how do they work?
What are some examples of vulnerabilities that patches address?
What might happen if an organization fails to apply patches regularly?
During an annual review of security policies, a company discovered that multiple incidents related to data leakage were a result of employees accidentally sending proprietary information to external contacts. Which of the following would be the BEST approach to mitigate this type of unintentional data loss?
Implement data loss prevention (DLP) systems that can detect and block sensitive data from being sent via email.
Increase the frequency of employee training on the acceptable use policy and proper data handling.
Review and update the procedures for external communications to include stricter guidelines.
Enforce more stringent role-based access controls on proprietary data.
Answer Description
Implementing DLP systems enables the organization to prevent certain types of sensitive data from being sent outside the corporate network, which directly addresses the concern of accidental data leakage mentioned in the scenario. While training on policy and the review of existing procedures may help reduce incidents, they are reactive measures that don't offer the technological prevention that DLP systems do. Role-based access controls are essential for limiting data access but would not necessarily prevent data from being sent to unauthorized recipients.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Data Loss Prevention (DLP) systems and how do they work?
Why is employee training on acceptable use policies still important?
What other measures can be taken to complement DLP systems in preventing data loss?
Which of the following actions is directly related to restricting access to network resources for a new employee who should only have limited permissions within the corporate environment?
Disabling unrelated features in the company's public web services
Enabling additional privileges to ensure full system functionality
Granting administrative access to network devices
Disabling unnecessary services on the employee's user account
Answer Description
Disabling unnecessary services on a new employee's account ensures that they only have access to the resources required for their role. It is a best practice in the principle of least privilege, reducing the attack surface by limiting possible entry points for threats. Enabling additional privileges, granting administrative access, or disabling unrelated features does not address the specific need to restrict access to network resources for the new employee.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
Why is it important to disable unnecessary services on a user account?
What are the consequences of granting administrative access to a new employee?
A company has been monitoring the performance of its network routers over a 2-year period and observed the following outages: Year 1 experienced 4 outages, totaling 16 hours, and Year 2 experienced 2 outages, totaling 12 hours. Assuming the network was operational for a total of 17,520 hours across both years, what is the Mean Time Between Failures (MTBF) for the network routers?
2,500 hours
2,920 hours
3,004 hours
2,752 hours
Answer Description
To calculate MTBF, divide the total operational time by the total number of failures. The total operational time over the 2-year period is 17,520 hours, and there were 4+2=6 outages. Therefore, the MTBF is 17,520 hours / 6 outages = 2,920 hours. Accurate calculation of MTBF is essential for gauging the reliability of equipment and scheduling maintenance to minimize downtime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does MTBF stand for and why is it important?
How do you calculate MTBF in different scenarios?
What are some common strategies to improve MTBF?
A corporation employs external auditors who require access to the company's server infrastructure for a limited duration. The security policy enforces minimum necessary privileges and mandates that access credentials should expire immediately after the auditing task is completed. Which of the following practices should be implemented to comply with the security policy?
Generating non-expiring API keys for auditors to use during their review
Issuing a set of shared credentials that the audit team can use
Allocating time-restricted access tokens for server access
Creating permanent accounts with privileged access for each auditor
Answer Description
Allocating time-restricted access tokens ensures that the auditors have temporary access to the necessary resources, and these tokens automatically expire after the designated period, aligning with the security policy of minimum necessary privileges and immediate expiration post-audit. API keys or permanent account credentials do not offer the same level of temporary access and can potentially remain active beyond the requirement, posing a security risk. Shared credentials are inherently insecure as they do not provide individual accountability and can be easily misused.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are time-restricted access tokens?
What does the principle of least privilege mean?
Why are shared credentials considered insecure?
A technology company is planning to outsource its customer data management to a third-party vendor. Before sharing any sensitive information, the company wants to ensure that the vendor is legally obligated to maintain the confidentiality of the data. Which document should the company require the vendor to sign?
MSA
SLA
NDA
MOU
Answer Description
A Non-Disclosure Agreement (NDA) is specifically designed to legally bind parties to keep shared sensitive information confidential. While other agreements like Service-Level Agreements (SLA), Master Service Agreements (MSA), and Memorandums of Understanding (MOU) address different aspects of vendor relationships, the NDA focuses on confidentiality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does NDA stand for and what is its purpose?
What is the difference between an NDA and an MSA?
When should a company use an NDA?
When establishing an effective security governance framework for an organization, which of the following is MOST essential to ensure alignment with business objectives and risk management strategies?
Recovery Point Objective (RPO) metrics
Password complexity standards
Information security policies
Annualized Rate of Occurrence (ARO) calculations
Answer Description
Information security policies are most essential for establishing a security governance framework that aligns with business objectives and risk management strategies. They set the overall direction and implement controls across the organization in line with its risk appetite, compliance requirements, and business goals, and they provide a formal framework for staff to understand their responsibilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are information security policies?
How do information security policies align with business objectives?
What role do risk management strategies play in security governance?
As the lead security analyst at a financial institution, you have been tasked with evaluating the effectiveness of the implemented security controls. During the audit, you need to verify that access control policies are correctly enforced and that there are no deviations from the standard configurations across all servers. Which of the following audit practices would be the MOST effective for this purpose?
Conducting a configuration audit
Executing a financial audit
Performing a performance audit
Undertaking an operational audit
Answer Description
A configuration audit specifically assesses configurations against established security baselines and policies, ensuring that systems are compliant with the required security settings. This would detect deviations in access control policies and configurations from the standard across servers. A performance audit, while it assesses the efficiency and effectiveness of an organization's processes, would not focus solely on security settings and policies. A financial audit is concerned with the financial accounts and transactions of an organization, and while an operational audit evaluates the operational aspects of an organization, it does not concentrate on access control policies and system configurations to the extent necessary for the given task.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are access control policies?
What is a configuration audit?
What is a security baseline?
Which type of disaster recovery site typically has infrastructure and utilities in place, but often requires additional configuration and data restoration before becoming operational?
Mobile site
Hot site
Warm site
Cold site
Answer Description
A warm site is a type of disaster recovery site that has the necessary hardware and connectivity in place but doesn't have client data continuously updated. This means that, in the event of a disruption, a warm site may require some time to restore recent backups and configure systems to become fully operational. It offers a middle ground between the immediate availability of a hot site and the lack of infrastructure of a cold site.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a warm site and a hot site?
What are the main advantages of using a warm site for disaster recovery?
What are the key components of a warm site?
A corporate network administrator is configuring access control on the switches to allow only authorized devices to connect to the LAN. The administrator wants to dynamically assign VLANs based on user identity and prevent unauthorized network access at the port level. Which of the following should be implemented?
Setting up Layer 7 firewall rules to assign VLANs
Configuring a WAF (Web Application Firewall) for VLAN assignment
Utilizing port security with MAC address filtering on the switches
Implementing 802.1X on the network switches
Answer Description
802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN. By using 802.1X, network access can be controlled at the port level and, with the proper backend support through RADIUS or a similar authentication server, VLANs can be assigned dynamically based on user identity, which is the requirement in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is 802.1X and how does it work?
What are VLANs and why is dynamic assignment important?
What is RADIUS and how does it relate to 802.1X?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.