CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Data stored on a SAN and not being processed is in which state?
Data at rest
Data in motion
Data in use
Data in transit
Answer Description
Data that isn’t active and is on a storage media is considered data at rest.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'data at rest' specifically refer to?
Why is data at rest considered less vulnerable than data in transit?
What are the common security measures for protecting data at rest?
What is the main function of Group Policy within a Windows domain environment?
Remote installation and configuration of software applications across all domain-joined desktops
Monitoring real-time performance data for servers within a domain
Synchronization of user files across different devices within the domain
Centralized management and configuration of users' settings and security policies
Answer Description
Group Policy is used to control the working environment of user and computer accounts. It provides centralized management and configuration of operating systems, applications, and user settings in an Active Directory environment. By using Group Policy, administrators can specify settings for groups of users and computers, ensuring consistency and compliance with security policies. Other options, while related to domain environments, do not accurately describe the primary function of Group Policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of settings that can be managed with Group Policy?
How does Group Policy interact with Active Directory?
What is a Group Policy Object (GPO)?
Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?
Publishing a quarterly newsletter highlighting social engineering threats
Including a quiz at the end of the training session
Conducting unannounced phishing simulation campaigns
Unannounced network scans after training completion
Answer Description
Phishing simulations are a practical method of testing employees' abilities to recognize and respond to social engineering attacks. This type of simulation provides actionable insights by creating realistic scenarios similar to actual phishing attempts, without the associated risk. This helps measure the effectiveness of the training and identifies areas where additional training may be necessary. Answer options like 'Unannounced network scans' and 'Publishing quarterly newsletters' are less direct and less effective methods of assessing the specific understanding of recognizing social engineering attacks. Although helpful in a broader security context, they do not directly test the application of the training content. 'Including a quiz at the end of the training session' can validate immediate retention but does not measure long-term understanding or practical application in an actual work environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are phishing simulations, and how do they work?
Why are unannounced phishing attacks more effective than quizzes?
What other methods can companies use to reinforce training on social engineering attacks?
An organization's network has been infected with a software that propagates itself across computers, encrypting files and demanding payment for the decryption key. Which of the following BEST describes this type of malicious code?
Worm
Ransomware
Virus
Trojan
Answer Description
Ransomware is characterized by its ability to encrypt files on infected systems and subsequently demand payment for a decryption key, often leading to monetary loss for affected users and organizations. Worms are typically standalone malware that replicate themselves to spread to other computers, without the need for user interaction, but do not demand ransom for recovery. Trojans are malicious programs that disguise themselves as legitimate software but do not have the self-replicating ability of worms or the specific extortion function of ransomware. Viruses, like worms, can self-replicate and spread, but they usually require some form of user action to initiate and may or may not include ransomware characteristics. The correct answer is ransomware because it best fits the criteria of encrypting files and demanding payment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common examples of ransomware attacks?
How can organizations protect themselves from ransomware?
What should someone do if their system becomes infected with ransomware?
A junior administrator suggests configuring the company's patch management system to automatically deploy all security patches to production systems immediately upon release from vendors. They argue this will minimize the window of exposure to new threats. Which of the following is the BEST reason to advise against this policy?
Untested patches can introduce new bugs, cause system instability, or create conflicts with existing software, potentially leading to operational downtime.
Automatic patching prevents security teams from properly documenting the changes in the system.
Applying patches immediately consumes excessive network bandwidth during business hours.
Vendors often release faulty patches and recall them within the first 24 hours.
Answer Description
The correct answer highlights the primary risk of deploying patches without prior evaluation. Untested patches can introduce new bugs, create software or hardware incompatibilities, and cause system instability, which may lead to significant operational disruptions and downtime. While other concerns like bandwidth consumption, patch documentation, and occasional vendor recalls are valid, the direct risk of causing system failures is the most critical reason for testing patches in a non-production environment before a full rollout.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are potential issues with applying patches immediately after release?
What is the importance of testing patches before deployment?
What are some best practices for patch management?
Which process typically initiates the creation of user accounts and the assignment of access rights within a company's systems?
Role changes
Offboarding
Onboarding
Maintenance
Answer Description
Onboarding is the process that typically initiates the creation of user accounts and assignment of access rights, as it refers to the steps taken to integrate a new employee into an organization, which includes providing them with the necessary credentials and access to fulfill their roles. Offboarding is the process of removing access rights and accounts when an employee leaves the company, which is the opposite action of onboarding. Maintenance refers to ongoing system upkeep and does not directly relate to the initial account creation. Role changes may involve modification of access rights but are not responsible for the initiation of account creation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What steps are involved in the onboarding process?
What are access rights, and why are they important?
How does the offboarding process work in contrast to onboarding?
Which access control model requires continuous verification and context-aware authorization to ensure the security of resources?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Zero Trust Model (ZTM)
Answer Description
The Zero Trust Model (ZTM) never assumes trust and always requires verification for anyone trying to access resources, making decisions based on multiple contextual factors such as user location, device security posture, and data sensitivity. This dynamic approach is in contrast to more static models such as Discretionary Access Control (DAC) or Role-Based Access Control (RBAC), which grant access based on predefined policies that do not change in real-time. Mandatory Access Control (MAC) enforces access policies based on classification levels but does not adapt to context after initial access is granted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of the Zero Trust Model?
How does the Zero Trust Model differ from traditional access control models?
What role does context play in the Zero Trust Model?
An enterprise is upgrading its data center's physical security. The security audit revealed that while they have reliable electronic access controls for data center entry points, there is no measure in place to identify tailgating when these access points are used. Which physical security enhancement should be employed to mitigate this risk?
Upgrading to biometric authentication systems
Installing mantraps at the entry points
Adding turnstiles at the access points
Increasing surveillance camera coverage at entry points
Answer Description
Mantraps are designed to prevent tailgating by ensuring that only one person can enter or exit an area after authentication. They are typically structured as two sets of interlocking doors that only allow one door to be open at once, thus preventing an unauthorized person from following an authorized person into a secure area. Turnstiles, while useful for controlling flow, can still be susceptible to tailgating, especially if they are not full-height. Biometric systems strengthen the authentication process but do not, on their own, prevent tailgating. Surveillance cameras can record attempts at tailgating but do not actively prevent the act.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are mantraps and how do they work?
What is tailgating in the context of physical security?
What are the advantages of upgrading to biometric authentication systems?
An organization has noticed that employees are accessing sensitive files unrelated to their responsibilities. The company wants to ensure that users can access only the data required for their tasks. Which of the following methods would BEST address this issue?
Implementing role-based access control
Applying network segmentation
Enforcing multi-factor authentication
Encrypting all sensitive files
Answer Description
Implementing role-based access control (RBAC) allows the organization to assign permissions to users based on their job responsibilities. This ensures that employees have access only to the resources necessary for their tasks, reducing unauthorized access to sensitive files. Encrypting files protects data confidentiality but doesn't prevent authorized users from accessing data beyond their responsibilities. Enforcing multi-factor authentication strengthens login security but doesn't control access permissions. Applying network segmentation divides the network but doesn't directly manage user access to specific files.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is role-based access control (RBAC)?
How does RBAC improve security in an organization?
What are some potential challenges of implementing RBAC?
What is the primary goal of employing uniform configuration standards across a company's technological environment?
To diversify system configurations, which in turn makes it harder for attackers to exploit vulnerabilities.
To tailor each system’s settings for user preference, thereby improving individual productivity.
To maintain a consistent set of configurations for enhanced security and simplified management.
To allow systems to operate independently of one another, minimizing the impact of network-wide updates.
Answer Description
The primary goal of uniform configuration standards is to establish a consistent security posture and operational behavior among the company's numerous devices and systems. This not only reduces the potential for errors but also simplifies administration and strengthens the organization's defense against common threats. Consistency makes it easier to manage updates, apply security policies, and ensure compliance with both internal guidelines and external regulations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are uniform configuration standards important for security?
How do uniform configuration standards simplify management?
What are some examples of uniform configuration standards?
An organization is planning to implement a new information security policy and wants to ensure all employees understand and formally acknowledge their responsibilities under the policy. Which of the following methods is the MOST effective to meet this objective?
Distribute the policy through an electronic signature platform requiring all employees to acknowledge by signing digitally.
Host an organization-wide informational session where the policy is explained and have employees verbally acknowledge after the session.
Post the new information security policy on the company’s internal website and assume all employees will comply.
Send out a company-wide email with the new policy and ask employees to reply if they do not understand the policy.
Answer Description
An electronic signature platform enables efficient distribution and provides a clear, auditable trail proving that all employees have read and acknowledged the information security policy. This system also ensures that the acknowledgment is securely recorded and easy to retrieve, which is important for compliance and verification purposes. Offering an informational session is a good practice for explaining the policy, but on its own, it doesn't ensure individual acknowledgment. Having employees verbally acknowledge does not offer a verifiable record for auditing purposes. Posting the policy on the company website makes it accessible, but does not guarantee reading or acknowledgment by employees.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an electronic signature platform?
Why is employee acknowledgment important in information security policies?
What are the advantages of having a secure record of acknowledgment?
Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?
Start documenting the details of the breach and response actions taken.
Notify the company's legal team and prepare for public disclosure.
Prioritize the review of security logs to trace the origin of the attack.
Immediately isolate affected systems to stop the spread of the breach.
Answer Description
The initial focus in the event of a security breach should be to limit the damage and prevent further compromise. This is achieved by containing the threat, thereby stopping the incident from affecting additional resources. While documenting the events and notifying appropriate parties are also important, these actions occur after the immediate threat has been controlled to prevent exacerbation of the situation. Analyzing logs is part of the subsequent investigation and not the immediate concern when a breach is in progress.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is isolating affected systems the priority during a data breach?
What standard security protocols should be followed after isolating systems?
What are security logs, and why are they important in breach investigations?
What is the significance of implementing an expiration time frame on user passwords within an organization's security policy?
It allows users to reuse their passwords more frequently, reducing the cognitive load.
It increases password complexity requirements automatically over time.
It decreases the number of password-related support calls to the IT department.
It reduces the risk of long-term use of compromised credentials by mandating regular updates.
Answer Description
Password expiration is a security measure used to limit the amount of time a password is valid. Requiring users to update their passwords regularly helps to mitigate the risks of older passwords being compromised over time. If an attacker obtains a password, a shorter expiration time can reduce the time window they have for unauthorized access before the password is changed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to reduce the risk of long-term use of compromised credentials?
How does password expiration contribute to organizational security policy?
What are some best practices for implementing password expiration policies?
Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?
To apply universal standards of cybersecurity that are recognized globally.
To ensure compliance with specific legal requirements that may not be covered by national or global standards.
To simplify the security program management by adhering to broader compliance laws.
To avoid the need for customizing security measures for different company branches.
Answer Description
An organization needs to comply with local and regional regulations to ensure that they are not violating any laws that may be specific to the jurisdictions they operate in. Not understanding these local nuances could lead to legal issues, such as fines or sanctions. For example, certain regions may have specific requirements for data protection that differ from national laws, such as stricter privacy regulations that mandate data residency within the region. National and global standards, while essential, may not cover all aspects of the local regulatory environment, and universal standards do not typically exist for cybersecurity, hence the specificity of the correct answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of local and regional regulations that organizations need to be aware of?
How do local regulations differ from national and global standards in cybersecurity?
What are the potential consequences for not adhering to local regulations in a security program?
During an incident response investigation, analysts discover Cyrillic comments and Russian-language debug paths embedded in the source code of malware used in a sophisticated breach. Which of the following BEST explains why this evidence alone cannot be taken as definitive proof that a Russian government agency conducted the attack?
Nation-state attackers always encrypt their production builds, so any readable strings must come from reuse by third-party developers.
Threat actors can deliberately embed linguistic and cultural markers as false flags to mislead investigators.
Open-source libraries automatically remove national language clues, so variable names are never reliable for attribution.
Russian is the default language in most compiler environments, so these markers are inserted automatically during compilation.
Answer Description
Attribution in cybersecurity is notoriously difficult because attackers can intentionally plant misleading evidence. Linguistic and cultural artifacts-such as comments, debug paths, or variable names written in a specific language-may be genuine, but they can also be inserted deliberately as false flags to divert suspicion toward another actor or nation-state. Without corroborating technical indicators, intelligence, or context, such markers are suggestive at best and never conclusive proof of government-sponsored espionage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are false flags in cyberattacks?
Why is attribution in cybersecurity considered complex?
What is corroborative intelligence in the context of cyberattacks?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.