CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test
- 20 Questions
- Unlimited
- General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which type of policy specifies the proper use of IT resources, including computers, networks, and data within an organization?
Business Continuity Plan
Acceptable Use Policy (AUP)
Software Development Lifecycle (SDLC) Policy
Disaster Recovery Plan
Answer Description
An Acceptable Use Policy (AUP) defines what users are and are not allowed to do with the organization's IT assets. This is crucial for maintaining the integrity and security of an organization's infrastructure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an Acceptable Use Policy (AUP) important for an organization?
How often should an Acceptable Use Policy (AUP) be updated?
What are some examples of guidelines typically included in an Acceptable Use Policy (AUP)?
What is the primary purpose of implementing security zones within a network infrastructure?
To simplify network management by grouping similar device types
To provide redundant network paths for load balancing purposes
To increase the performance and speed of the network by reducing congestion
To isolate network segments by security levels and enforce distinct policies
Answer Description
Security zones are utilized to segregate different parts of the network, often by their role or requirements for security, to apply appropriate controls and limit the spread of security breaches. By controlling communication between zones, the risk of a compromised system affecting the entire network is reduced. Each answer choice is related to network management or security, but only one specifically addresses the central concept of isolating network segments to enhance security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security zones in a network?
How do security zones communicate with each other?
What is the role of a DMZ in network security?
A security administrator is implementing hardening measures on a critical server to reduce the risk of compromise. The administrator's primary concern is preventing an attacker who has successfully phished a user's password from gaining administrative access. Which of the following controls would be the MOST effective mitigation for this specific threat?
Applying the latest security patches to the operating system
Enforcing multifactor authentication (MFA) on all administrative accounts
Implementing a host-based firewall to restrict network traffic
Enforcing a strong password complexity and rotation policy
Answer Description
The most effective control in this scenario is multifactor authentication (MFA). MFA requires more than just a password to authenticate, so even if an attacker steals a user's password, they cannot access the account without the second factor (e.g., a token, biometric scan, or push notification). A strong password policy is a good practice, but it is defeated once the password is stolen. Applying the latest security patches is crucial for preventing vulnerability exploitation but does not stop an attacker from using valid, stolen credentials. A host-based firewall controls network access but does not prevent a legitimate-looking authentication attempt with a stolen password from a permitted location.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does multifactor authentication (MFA) enhance security?
What are some common types of MFA factors used today?
Why isn't a strong password policy enough to prevent attacks?
An organization has recently implemented a monitoring system that flags unusual behavior on its network and alerts the security team for potential security breaches. This system was established after a recent incident where unauthorized access went undetected for an extended period. Based on this scenario, what type of control has the organization most likely implemented?
Compensating Control
Preventive Control
Detective Control
Corrective Control
Answer Description
The organization has implemented a detective control. Detective controls are designed to identify and alert when a security incident occurs. The scenario describes a monitoring system that flags unusual behavior, which aligns with the detection and alerting function of a detective control. Preventive controls aim to stop incidents from occurring before they happen, which is not the focus in this scenario. Corrective controls are instituted to limit the damage after an incident has occurred, which is again not the main function described. While compensating controls provide an alternative measure if primary controls fail or are not feasible, the scenario directly mentions the implementation was a response to a previous undetected breach, indicating it is a primary monitoring solution, not a compensatory one.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary purpose of a detective control in cybersecurity?
How does a detective control differ from a preventive control?
What are examples of tools or technologies used as detective controls?
Which of the following statements best characterizes symmetric encryption when compared with asymmetric encryption?
It removes the need for any secure key-exchange process between communicating parties.
It relies on two mathematically related keys, one public and one private, for all cryptographic operations.
It uses a single secret key that both the sender and receiver use to encrypt and decrypt data.
It is primarily used to generate digital signatures that verify data integrity and origin.
Answer Description
Symmetric encryption uses a single shared secret key for both encryption and decryption. This design makes it computationally efficient but requires a secure method to distribute the key to all parties. In contrast, asymmetric encryption employs two mathematically related keys (a public key for encryption and a private key for decryption), eliminating the need to share the private key but at the cost of higher computational overhead. Statements describing key pairs, elimination of key-exchange requirements, or digital-signature creation refer to asymmetric encryption, not symmetric encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of symmetric encryption compared to asymmetric encryption?
How is the secret key securely exchanged in symmetric encryption?
What are some common use cases for symmetric encryption?
A systems administrator needs to implement a stringent application control policy on a server that handles sensitive data. The policy must ensure that only a specific set of pre-approved applications can be executed, and all other applications are blocked by default. Which of the following security controls would be the MOST effective to achieve this goal?
Application allow list
Application deny list
Network Access Control (NAC)
Anomaly-based intrusion detection system
Answer Description
An application allow list is the most effective control because it operates on a 'deny-by-default' principle, permitting only explicitly approved applications to run. This is the most restrictive and secure approach for a sensitive server. An application deny list would block known bad applications but allow all others, which is less secure. Anomaly-based intrusion detection is a detective control that identifies unusual behavior but does not block application execution. Network Access Control (NAC) is a control that restricts device access to the network, not what applications can run on a host.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Application Allow List?
How does an Application Allow List differ from an Application Deny List?
Can an Application Allow List be bypassed?
What does RPO define in a disaster recovery strategy?
The amount of data an organization can afford to lose, measured in time.
The time to restore IT systems after a disruption.
The procedures used to handle security incidents.
The strategies implemented to prevent unauthorized access to systems.
Answer Description
RPO (Recovery Point Objective) defines the amount of data an organization can afford to lose, measured in time. This helps in determining the frequency of data backups to ensure data loss stays within acceptable limits. The other options relate to different aspects of disaster recovery, such as restoration time, incident response procedures, and access prevention strategies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How is RPO different from RTO?
What factors influence the determination of an RPO in a disaster recovery plan?
What are common backup methods to meet RPO requirements?
A security team is evaluating new perimeter security solutions to replace their traditional firewall. The primary goal is to gain visibility into and control over the specific web applications being used (e.g., social media, streaming services) and to block threats that leverage application-layer protocols. Which of the following firewall types is specifically designed to meet these requirements?
Circuit-level gateway
Stateless packet-filtering firewall
Next-generation firewall (NGFW)
Stateful inspection firewall
Answer Description
The correct choice is a Next-Generation Firewall (NGFW). NGFWs are advanced firewalls that operate up to Layer 7 (the application layer) of the OSI model. Unlike traditional firewalls that are limited to inspecting traffic based on ports and IP addresses (Layers 3 and 4), NGFWs can perform deep packet inspection (DPI) to identify the specific applications in use and enforce security policies on them. They also integrate other security features like an intrusion prevention system (IPS) to block application-layer attacks. Stateless and stateful firewalls are older technologies that lack this deep application awareness. A circuit-level gateway operates at the session layer (Layer 5) and does not inspect application content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is deep packet inspection (DPI) in the context of NGFWs?
How does a Next-Generation Firewall (NGFW) differ from a traditional stateful firewall?
What role does an Intrusion Prevention System (IPS) play in a Next-Generation Firewall?
What aspect of data retention policies is MOST crucial for ensuring compliance with legal and regulatory frameworks?
The categorization of data as sensitive, confidential, or public
The length of time that data must be stored before it can be destroyed or archived
The storage costs associated with different types of data
The encryption strength used to protect data during the retention period
Answer Description
Data retention timeframes are pivotal to compliance since they dictate the specific duration for which data must be stored according to various legal and regulatory frameworks. Organizations are often required to retain certain records for a defined period to comply with laws and industry regulations. Retaining data for either too short or too long a period can lead to non-compliance and associated penalties. Having too broad or too narrow scopes in retention policies can be non-compliant or inefficient, respectively, but the actual retention period is the key factor that relates directly to legal and regulatory requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is the length of data retention timeframes so critical for compliance?
How do organizations determine the appropriate data retention periods for compliance?
What are the risks of retaining data for longer than necessary under compliance guidelines?
You recently purchased a new home. One of your first actions after taking ownership is to install a monitored alarm system that will sound a siren and notify a security company if an intruder enters the house. This system is an example of which type of security control?
Detective
Deterrent
Preventive
Corrective
Answer Description
The alarm system is a detective control. Its primary purpose is to detect unauthorized entry after it occurs and generate an alert so that an appropriate response can be initiated. It does not physically stop an intruder (preventive), mainly scare them away (deterrent), or repair damage after the fact (corrective).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are detective controls in cybersecurity?
How is a detective control different from a preventive control?
Can an alarm system ever be classified as a deterrent control?
An organization needs to prevent unauthorized external access to its internal network but still allow employees to access external resources necessary for their work. Which security technology should the organization implement to best achieve this goal?
Implement a firewall to control and filter network traffic based on security rules.
Use encryption to secure sensitive data transmitted over the network.
Deploy an intrusion detection system to monitor network activities for suspicious behavior.
Install physical access controls to restrict entry to the organization's facilities.
Answer Description
Implementing a firewall is the most effective solution in this scenario. A firewall acts as a barrier between the internal network and external sources, controlling incoming and outgoing network traffic based on predefined security rules. It blocks unauthorized access attempts from external entities while allowing legitimate outbound communication required by employees. An intrusion detection system monitors network activities for suspicious behavior and generates alerts but does not prevent access. Encryption secures data but does not control network access. Physical access controls protect the physical hardware and premises but do not safeguard the network from external cyber threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a firewall function in network security?
What is the difference between a firewall and an intrusion detection system (IDS)?
What are the types of firewalls and their differences?
In an initiative to proactively defend against emerging cybersecurity threats, your company has started receiving updates from a threat intelligence service. As a security analyst tasked with enhancing the organization's defensive strategies, what is the most effective action to take when operationalizing this new intelligence?
Use the intelligence solely to inform the incident response team to plan and prepare for potential future attacks.
Update definitions for firewalls and intrusion prevention systems with indicators of compromise derived from the threat intelligence updates.
Create a dedicated dashboard for real-time alerts that utilizes threat intelligence data to track potential incidents.
Subscribe to a variety of additional threat intelligence providers in order to cross-reference and verify the new intelligence.
Answer Description
Updating security control definitions with information from the threat feed immediately turns raw intelligence into preventive controls. By loading new indicators of compromise into firewalls, intrusion prevention systems, and similar technologies, the organization can automatically detect or block activity associated with the identified threats. Creating dashboards, adding more feeds without a plan, or reserving the data only for incident response are useful but do not embed the intelligence directly into real-time defenses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are indicators of compromise (IOC)?
How do firewalls and intrusion prevention systems (IPS) use threat intelligence data?
Why is proactive defense important in cybersecurity?
A security team needs to grant external auditors temporary access to specific cloud servers for a one-week audit. Company policy dictates that access must follow the principle of least privilege and be revoked automatically after the audit. Which of the following privileged access management (PAM) techniques BEST meets these requirements?
Implement ephemeral credentials that expire after the audit period.
Create permanent, role-based accounts for each member of the audit team.
Issue a shared password that provides access to all necessary servers.
Provision non-expiring API keys restricted to the auditors' IP addresses.
Answer Description
Implementing ephemeral credentials is the best solution as they are, by definition, temporary and designed to expire after a short, predefined period. This directly aligns with the policy requirement for access to be automatically revoked after the audit. This approach embodies the principles of Just-in-Time (JIT) access and least privilege by providing access only for the duration it is needed. Permanent accounts create a standing privilege that increases the attack surface, which is against security best practices. Shared passwords eliminate individual accountability and are a poor security practice. Non-expiring API keys, even if IP-restricted, violate the policy for temporary access and create a persistent security risk if compromised.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a time-restricted access token?
Why are shared credentials considered insecure?
How do time-restricted access tokens compare to API keys for temporary access?
An organization's security policy mandates that any implemented security solutions must not interfere with network traffic or introduce potential points of failure, but the company still wants to be alerted to any suspicious activities on the network. Which of the following would BEST achieve this goal?
Implementing an Intrusion Detection System
Deploying a firewall with deep packet inspection
Installing an Intrusion Prevention System
Using a Content Filter
Answer Description
An Intrusion Detection System (IDS) operates passively by monitoring network traffic and alerting administrators to suspicious activities without interfering with the traffic flow or introducing latency. It does not become a point of failure because it does not sit inline with the network traffic. In contrast, an Intrusion Prevention System (IPS) actively analyzes and can block or modify traffic to prevent threats, potentially introducing latency and becoming a point of failure. A firewall filters network traffic and can affect performance or interfere with legitimate traffic. A Content Filter inspects and potentially blocks specific content, which can also interfere with traffic and introduce latency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main difference between an IDS and IPS?
How does an IDS detect suspicious activities?
Why might an organization prefer an IDS over an IPS?
The IT department of Enhanced Solutions is evaluating their current security posture compared to the industry's best practices to improve their security measures. They are assessing the difference between their current state and the desired state of security. Which process are they most likely engaging in?
Security baselining
Gap analysis
Impact analysis
Risk assessment
Answer Description
Gap analysis is the correct answer because it involves comparing the current state of a system, process, or security posture with the desired or future state in order to identify discrepancies and areas for improvement. In this scenario, the IT department is conducting a gap analysis to determine where their security posture stands against industry best practices and what steps they need to take to reach their desired level of security. A risk assessment focuses on identifying, evaluating, and prioritizing risks – it does not inherently compare current and desired states. Security baselining involves setting a minimum level of security to compare against future measurements, but it does not involve a comparison to industry best practices. An impact analysis is generally conducted to understand the effects of system changes, not to compare current and desired security postures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific steps are involved in performing a gap analysis?
How is gap analysis different from risk assessment?
What tools or frameworks can assist in conducting a gap analysis?
What does the term 'impossible travel' signify in the context of security monitoring?
A type of race condition vulnerability exploited during security checks
A security measure taken after multiple unsuccessful login attempts from different locations
A warning sign that a user account is accessed from two distant places in a period too short for regular travel, hinting at credential misuse
A method by which session hijacking attacks are performed on multiple accounts at once
Answer Description
'Impossible travel' refers to a situation where a user account is accessed from geographically distant locations within a timeframe that is too short for normal travel to occur, suggesting the use of compromised credentials. This is an important red flag for security analysts as it may indicate an account takeover by an unauthorized user. In contrast, 'Concurrent session usage' may raise concern but does not imply physical impossibility, 'Account lockout' is a response to suspicious activities and itself is not an indicator, and 'Time-of-check (TOC)' relates to a specific vulnerability type concerning the timing of security checks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools can detect 'impossible travel' events?
How do security analysts verify if 'impossible travel' is a real threat?
How can organizations prevent 'impossible travel' scenarios?
When implementing hardening techniques on a company's main database server to minimize its attack surface, which of the following measures should be taken FIRST?
Implement account lockout policies after several failed login attempts.
Update the server to the latest stable OS version and apply all available security patches.
Conduct a vulnerability scan to identify and fix security flaws.
Configure the firewall to allow only essential traffic.
Answer Description
The process of hardening a server should begin with updating the server to the latest stable version of the operating system, including all the available security patches. This action addresses known vulnerabilities and reduces the number of potential attack vectors that could be exploited. Configuring a firewall, setting account lockout policies, and conducting a vulnerability scan are important hardening steps, but they come after ensuring that the server is running the most secure operating system version available.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is updating the OS and applying security patches considered the FIRST step in server hardening?
What is the difference between hardening and conducting a vulnerability scan?
How does configuring a firewall complement the server hardening process?
A merged entity is facing a challenge integrating its central authentication service, based on a well-established directory protocol, with a newly acquired company's applications that authorize users through a popular web-based authorization standard. To achieve a cohesive authentication process across both existing and newly included systems, what is the appropriate solution to adopt?
Employ a federation service to bridge the two distinct user authentication systems for seamless operation.
Enforce strict two-factor authentication for users of both systems to enhance overall security posture.
Amend password management policies to standardize user credentials across all systems and applications.
Establish an encrypted channel between the two systems to securely map user accounts from one to the other.
Answer Description
Implementing a federation service is the correct solution because it enables different authentication systems to interoperate by allowing them to trust and validate each other's users. It serves as a middle layer that manages and brokers identity information between organizations, thus simplifying cross-domain user access. Additionally, a federation service allows users to authenticate once and gain access to multiple applications, even if the underlying authentication protocols differ. Updating password management procedures or initiating enhanced user credential verification does not provide a method for protocol interoperability. Introducing additional network-layer security, such as an encrypted channel, does not address the core issue of authenticating users across different authentication protocols.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a federation service in authentication systems?
What are some examples of popular web-based authorization standards?
How does Single Sign-On (SSO) work in federation systems?
An attacker is attempting to impersonate a trusted entity by presenting a fabricated network packet that appears to be part of an ongoing communication. Which kind of attack does this scenario best describe?
Replay
Phishing
Forgery
Spoofing
Answer Description
The correct answer is: Spoofing.
Spoofing: Spoofing specifically refers to the act of imitating a trusted device or user on a network. By creating fabricated packets that appear to originate from a legitimate source, the attacker can gain unauthorized access or disrupt communication flows.
Replay: A replay attack involves capturing and retransmitting legitimate network traffic to gain unauthorized access or manipulate data. While it utilizes existing packets, it doesn't necessarily impersonate a trusted source.
Phishing: Phishing attacks attempt to trick users into revealing sensitive information by disguising themselves as legitimate entities (e.g., emails or websites). Spoofing can be a technique used in phishing attacks, but it's not the sole characteristic.
Forgery: Forgery can encompass a broader range of activities like counterfeiting documents or digital signatures. In the context of network security, spoofing is a more specific term referring to impersonation on a network level.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common types of spoofing attacks?
How does spoofing differ from a replay attack?
What defenses can be implemented to prevent spoofing attacks?
An organization wants to improve its physical security posture by enhancing the verification process at the entrance of a secure data center. Which of the following options is the BEST solution to ensure that only authorized individuals gain entry?
Installing surveillance cameras at all entry and exit points.
Installing a biometric access control system that requires fingerprint verification.
Deploying a combination lock on the main door of the data center.
Distributing key cards to all employees with access to the data center.
Answer Description
Biometric access control systems provide a high level of security by using unique physical characteristics of individuals, such as fingerprints, retinal scans, or facial recognition, to verify a person's identity. This is more secure than using key cards alone, since key cards can be lost, stolen, or duplicated, while biometric traits are much harder to replicate or share. A combination lock, while providing a layer of security, does not uniquely identify an individual and could be more easily compromised through observing the entry or sharing the code. Surveillance cameras act as a deterrent and a means to record events, but they do not actively restrict access to authorized personnel.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are biometric systems considered more secure than key cards or combination locks?
What happens if a person’s biometric data is stolen or compromised?
How do biometric access systems deal with individuals who may have physical impairments?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.