CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following BEST describes the primary purpose of attestation in a security governance context?
To provide a detailed analysis of potential risks to the organization's assets
To detect and respond to security breaches in real time
To forecast potential future threats to the organization's security posture
To provide assurance that security controls are effectively in place as per policies and standards
Answer Description
Attestation is primarily conducted to provide assurance that security controls are in place and operating effectively as per the established policies and standards. It's an acknowledgement or certification by a party, often an external auditor, that the entity being reviewed has met specific criteria set forth by regulations, industry standards, or company policies. It is not simply about detecting security breaches or forecasting future threats; rather, it is a formal statement that certain conditions have been met. As for 'providing a detailed analysis of potential risks,' this is more aligned with risk assessment activities whereas attestation is the affirmation of previously identified controls and compliance statuses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security controls and why are they important for attestation?
What is the role of external auditors in the attestation process?
How does attestation differ from risk assessment?
You are the system administrator for your company. You notice that a large number of accounts have been locked out due to incorrect password entries. This is most likely an indicator of which type of malicious attack?
Keylogger
Ransomware
Brute force
Trojan
Answer Description
A brute force attack involves trying random passwords on user accounts in an attempt to gain access. If accounts are set up to auto lock after a certain number of failed login attempts this can be a sign of an attacker's attempt to brute force accounts.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a brute force attack?
How can I protect against brute force attacks?
What are some signs that a brute force attack is occurring?
During a security awareness training session, you want to ensure employees are equipped to identify fraudulent emails attempting to obtain sensitive company data by impersonating a trusted source. Which type of security threat should the training primarily focus on?
Spear phishing
Vishing
Phishing campaigns
Tailgating
Answer Description
The correct answer is 'Phishing campaigns' because they involve the use of communications, typically emails, that attempt to fraudulently obtain sensitive information by impersonating a trusted organization or individual. 'Spear phishing' is a more targeted version of phishing, and while it is related, the question is asking about the broader term. 'Vishing' refers to voice call scams, and 'Tailgating' is a physical security breach method, which does not fit the context of identifying fraudulent emails.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly are phishing campaigns?
What distinguishes spear phishing from regular phishing?
What is vishing and how is it different from phishing?
Your company is deploying a new set of servers acquired from a hardware provider. What is the BEST initial step to ensure these devices do not introduce vulnerabilities into the company's network?
Review and verify the server firmware to ensure it's up-to-date and from a legitimate source.
Enable full disk encryption on all servers as part of the initial configuration.
Perform a comprehensive vulnerability scan on all servers immediately after they're connected to the network.
Conduct penetration testing on the servers to identify and exploit potential security weaknesses.
Answer Description
Reviewing and verifying the security posture of the server firmware is the most effective step to ensure the new devices comply with security best practices before they are integrated into the company's network. Firmware can often be a target for supply chain attacks and may contain vulnerabilities that need to be addressed. While conducting penetration testing is valuable, it is not the first step in ensuring the security of new hardware. Similarly, vulnerability scanning is important but would follow the initial step of reviewing the firmware. Enabling full disk encryption is a good security practice for data protection but would not necessarily address potential supply chain vulnerabilities present in firmware or hardware configuration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is firmware and why is it important to verify it?
What are supply chain attacks and how can they affect my servers?
Why is vulnerability scanning not the first step in server deployment?
During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?
Packet captures
Operating system-specific security logs
Vulnerability scans
Firewall logs
Answer Description
Operating system-specific security logs are designed to record events that are significant to the security of the operating system. They can provide detailed information about the activities on a server, such at login attempts, access to protected objects, and changes to security policies. These logs are more likely to give an accurate picture of the scope of a suspected breach compared to the other options, which may provide too broad or peripheral view, or lack the level of detail necessary for an analysis of server activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kind of information do operating system-specific security logs typically contain?
How are packet captures different from operating system-specific security logs?
Why are firewall logs less effective for determining the scope of a suspected breach on servers?
A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?
Tokenization
Encryption
Masking
Geolocation
Answer Description
Tokenization is the best answer because it substitutes the sensitive data with non-sensitive equivalents, known as tokens, which have no exploitable value. This allows the company to process transactions without exposing actual credit card data, significantly reducing the risk of breaches while still enabling business functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is tokenization and how does it work?
How does tokenization differ from encryption?
Why isn't encryption considered the best option for reducing credit card data breach risks?
What enables an organization to have an accurate inventory of all hardware, software, and data assets to support effective security monitoring and rapid incident response?
Vulnerability scans
Asset tracking
Patch management
Data retention policies
Answer Description
Asset tracking is essential because it helps an organization maintain an up-to-date inventory of all its assets. This inventory provides the foundation for security monitoring by ensuring that all assets are known, managed, and under the control of IT. It facilitates rapid response to incidents by allowing security personnel to quickly identify which assets may be affected. Without proper asset tracking, organizations may overlook critical assets, leaving them vulnerable to security threats or inefficient in responding to incidents.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the methods of asset tracking?
How does asset tracking improve incident response?
What role do data retention policies play in asset management?
A company's IT department is tasked with protecting sensitive client data stored on their servers. To minimize the risk of unauthorized data exposure, the department needs to implement a solution that ensures the data is unreadable without the proper decryption key, even if it falls into the wrong hands. Which method should be used to secure the data on these servers?
Full-Disk Encryption
Encrypting the email communications containing client data
Using database encryption for only the tables with sensitive client data
Implementing file-level encryption for each client record individually
Answer Description
Full-Disk Encryption (FDE) is the method designed to encrypt the entire disk drive, ensuring that all data on the drive is protected against unauthorized access and is unreadable without the correct decryption key. This is crucial for minimizing risks such as data theft, especially if the physical servers are compromised. Implementing file-level encryption could leave system files or temporary files unencrypted, which might still contain sensitive information. Database encryption could protect the contents of the database, but would not protect against threats at the file system or OS level. Encrypting email communications would not protect data at rest on the servers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Full-Disk Encryption (FDE)?
What are the advantages of Full-Disk Encryption versus file-level encryption?
What types of data can Full-Disk Encryption protect?
Which of the following statements BEST explains why a network firewall alone cannot provide the same level of protection as encryption for data stored on a network file server?
A firewall enforces access rules for network traffic, but only encryption renders the stored data unreadable to unauthorized users, so both controls are required to protect data at rest.
Neither firewalls nor encryption protect data at rest; only physical security controls such as locks and guards can do so.
Encryption secures data moving across the network, whereas a firewall secures all data that resides on the server's drives.
A properly configured firewall automatically encrypts any files transmitted or stored behind it, eliminating the need for separate data-at-rest encryption.
Answer Description
A firewall filters or blocks network traffic according to predefined rules, helping to prevent unauthorized access over the network. It does not transform the actual data on the server. If an attacker bypasses the firewall-through stolen credentials, an insider threat, or physical access-the files remain readable unless they are encrypted. Encrypting the disk, volume, or files converts them into ciphertext that is unintelligible without the decryption key, preserving confidentiality even if the storage media is stolen or the system is compromised. Therefore, encryption-not the firewall-provides protection for data at rest.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a firewall and how does it work?
What is data at rest and why is it important to encrypt it?
What are the different types of encryption techniques available?
What is the primary purpose of performing a packet capture in the context of network security?
To restrict access to network resources based on IP addresses
To collect and analyze network traffic for security monitoring and investigative purposes
To increase the bandwidth and performance of the network
To provide network users with a secure method of file transfer
Answer Description
A packet capture involves collecting all the packets that pass through a certain point on a network. It allows security professionals to see the data being transmitted over the network, which can be valuable for analyzing traffic, troubleshooting network problems, or investigating security incidents. Examining packet contents helps to identify malicious activities, policy violations, or unauthorized data exfiltration. It's a detailed form of network monitoring used to closely inspect network traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools are commonly used for packet capture in network security?
How does packet capture help in identifying security threats?
What is the difference between a passive and active packet capture?
A network administrator is deploying an inline intrusion prevention system (IPS). Security policy dictates that if the IPS software crashes or the appliance loses power, no traffic may bypass inspection. Which of the following failure modes should the administrator configure on the IPS to satisfy this requirement?
Fail-open
Failover
Fail-safe
Fail-closed
Answer Description
Fail-closed (sometimes called fail-secure) means that when a security control becomes unavailable, it blocks or denies traffic instead of allowing it to pass unchecked. Configuring the IPS to fail-closed therefore prevents uninspected packets from traversing the network during an outage. Fail-open does the opposite-it allows all traffic for the sake of availability. Fail-safe focuses on protecting other components, often by bypassing the device rather than dropping traffic, and failover relies on redundant equipment rather than a traffic-blocking posture.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'fail-closed' mean in a security context?
What are the implications of using fail-closed versus fail-open?
How do security devices determine legitimacy?
Which identity and access management solution creates a single point of failure whereby compromising one set of user credentials could let an attacker access every connected application the user is authorized for?
IPSec virtual private network (VPN) tunnel
Discretionary access control (DAC) model
Single sign-on (SSO) service
Network segmentation using VLANs
Answer Description
Single sign-on (SSO) relies on a centralized identity provider. After the initial logon, the provider issues tokens that all integrated applications accept, so one compromised credential can unlock everything the user can reach. VPNs, network segmentation, and discretionary access control models do not inherently grant blanket access with one password.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Single Sign-On (SSO)?
What is multi-factor authentication (MFA) and why is it important?
What are the risks associated with centralized authentication services like SSO?
A company is preparing to roll out a major update to one of its critical applications. The update includes new features and security patches. Prior to deployment, the security team wants to ensure that they can quickly revert to the previous stable version in case of unexpected problems with the new release. Which method would BEST ensure that they can manage and control application versions effectively?
Update the disaster recovery plan to include steps for reverting application updates.
Implement a version control system to manage application updates and rollbacks.
Deploy an automated patch management tool to handle version updates.
Create regular manual backups of the application's installation directory.
Answer Description
Using a version control system is the best method for managing and controlling application versions as it allows teams to track changes, revert to previous versions, and maintain a history of modifications. This system enables quick reversion to a known good state in case the new update causes issues. Manual backups could also allow reversion but lack the history tracking and might not be as current. An automated patch management tool is more for ensuring systems are up-to-date and is not designed primarily for version tracking or quick reversion. The disaster recovery plan focuses on recovering from catastrophic events and is not typically used for routine version management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system?
What are the benefits of using version control for application updates?
How does version control differ from manual backups?
What is the primary purpose of applying masking to sensitive data within an organization's IT environment?
To encrypt data with a cryptographic key to ensure only authorized users can access the content
To obscure specific data elements within a database to hide sensitive information from unauthorized viewers
To irreversibly transform data into a cryptographic string to verify its integrity
To physically separate sensitive data from the rest of the organization's data environment
Answer Description
The primary purpose of masking sensitive data is to prevent unauthorized users from viewing its actual content while still allowing the data to be usable for certain operations or processes. This is accomplished by hiding the original data with modified content (such as replacing or scrambling data), which is reversible only when necessary and appropriate. Other methods like encryption and hashing are designed for different security controls: encryption secures data by making it unreadable without the correct key and is meant to be reversible, whereas hashing is used to verify data integrity and is not reversible.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of data can be masked, and how is the masking process performed?
In what scenarios is data masking preferable over encryption?
How do organizations decide which data to mask?
Which type of attack involves attempting possible combination of letters, numbers, and symbols until the correct password is found, often leading to unauthorized system access?
Brute force attack
Phishing
Dictionary attack
Spoofing
Answer Description
A brute force attack is a trial-and-error method used to decode encrypted data such as passwords. This type of attack systematically checks all possible combinations to discover the correct one, which can eventually allow an attacker to gain unauthorized access. This definition aligns with the description of a brute force attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common strategies to prevent brute force attacks?
How does a brute force attack differ from other types of attacks, like phishing?
What tools can be used to carry out brute force attacks?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.