CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Scroll down to see your responses and detailed results
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following is a physical device used to securely generate, store, and manage cryptographic keys, offering high levels of security for encryption processes?
Hardware Security Module
Secure Enclave
Key Management System
Trusted Platform Module
Answer Description
A Hardware Security Module (HSM) is a physical device that provides secure generation, storage, and management of cryptographic keys. HSMs are designed to protect keys from unauthorized access and are used to enhance security in encryption processes. A Key Management System is typically software-based and manages keys but doesn't provide the physical security level of an HSM. A Trusted Platform Module (TPM) is a hardware-based security chip embedded in devices, used mainly for device authentication and integrity verification rather than comprehensive key management. A Secure Enclave is a secure area within a processor, primarily used in mobile devices to store sensitive data, but it is not a standalone device like an HSM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a Hardware Security Module (HSM)?
How do HSMs differ from software-based key management solutions?
Can you explain the roles of Trusted Platform Module (TPM) and Secure Enclave in relation to HSMs?
What type of security exercise involves a discussion-based activity where team members analyze and resolve hypothetical scenarios to enhance cybersecurity preparedness?
Simulation
Tabletop exercise
Fire drill
Automated report training
Answer Description
A tabletop exercise is a discussion-based activity where members of an organization, including IT and management teams, analyze and resolve hypothetical situations. This type of training is valuable as it allows team members to think through the policies, procedures, and roles they would play during a real event without the pressure of an actual emergency. Such exercises are critical for improving an organization's incident response and establishing a culture of security awareness. They differ from simulations, which are hands-on practices that often involve the actual use of technology to respond to a mock incident, and from fire drills, which are physical evacuation practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components involved in a tabletop exercise?
How do tabletop exercises differ from simulations in cybersecurity training?
What benefits do tabletop exercises provide for an organization's cybersecurity preparedness?
An organization wants to gather intelligence on attack techniques by implementing a system that mimics vulnerable services and records interactions with potential intruders. Which of the following would BEST achieve this goal?
Honeypot
Firewall configured with logging
Vulnerability scanner
Intrusion detection system
Answer Description
A honeypot is designed to appear as a vulnerable system to attract attackers. By mimicking services and recording interactions, it allows organizations to study attack methods without compromising actual assets. While an intrusion detection system monitors network traffic for suspicious activity, it does not simulate vulnerable services. A firewall configured with logging controls access but doesn't engage attackers to gather intelligence. A vulnerability scanner identifies weaknesses but doesn't record attacker interactions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a honeypot and how does it work?
How do honeypots differ from intrusion detection systems (IDS)?
What are some potential risks of using a honeypot?
A security administrator is creating a document that provides non-mandatory recommendations and best practices for employees on how to securely handle sensitive company data. Which of the following control documents is the administrator creating?
Policy
Procedure
Standard
Guideline
Answer Description
The correct answer is a guideline. A security guideline is a document that provides recommendations and best practices; it is not mandatory. In contrast, a policy is a high-level statement of intent from management that is mandatory. A standard is a mandatory rule that supports a policy, often specifying technologies or configurations. A procedure is a detailed, step-by-step set of instructions for performing a specific task, which is also mandatory.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key elements that make up a security guideline?
How do security guidelines differ from security policies?
Why is it important to adhere to security guidelines?
A government agency requires the setup of an ultra-secure communication system for handling top-secret information. Which of the following represents the most appropriate approach to achieve the maximum level of security through physical isolation?
Installing a high-end firewall with strict access control lists.
Creating multiple VLANs to segregate top-secret communication from other data traffic.
Setting up the system on a completely air-gapped network.
Using dedicated cabling to connect systems while still being part of the internet.
Answer Description
Creating an air-gapped network that is not connected to the internet or any other networks is the most secure form of physical isolation. This prevents any form of remote access or cyberattack that depends on network connectivity. Using dedicated cabling still leaves the system connected to external networks; VLANs provide only logical segmentation on shared infrastructure; and firewalls merely filter traffic on connected networks, so none of those options achieve true physical isolation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an air-gapped network?
Why is physical isolation important for secure communications?
What are VLANs and how do they differ from air-gapped networks?
A digital forensics investigator is collecting evidence from a compromised workstation. Which action best maintains the chain of custody?
Encrypt the evidence to protect it from unauthorized access.
Use write-blocking devices to prevent data alteration.
Analyze the evidence on the original workstation to maintain context.
Record the date, time, and individuals who handle the evidence.
Answer Description
Recording the date, time, and individuals who handle the evidence ensures a documented trail, which is crucial for maintaining the chain of custody. This documentation verifies that the evidence has not been tampered with and is admissible in court. While other actions like using write-blocking devices are important for preserving evidence integrity, they do not directly address the documentation aspect of the chain of custody.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the chain of custody in digital forensics?
Why is documentation of evidence handling so important?
What are write-blocking devices, and why are they used?
You are working as a cybersecurity analyst for a 3rd party contractor. You have been brought in by an organization who believes they were hacked by a malicious actor. Their internal security team has hired you to determine the impact of the unauthorized access. At the time of the intrusion there were 5 servers online: DEV_APP_001, PRD_APP_002, PRD_DB_008, STG_DB_004 and FINANCE_009. What step should you take to begin the analysis?
Create a snapshot backup and then reformat each server
Create a new server running Kali Linux and make necessary firewall changes to allow it to access all the listed servers
Begin analyzing each server after prioritizing them based on the data stored on each server
Begin hardening all servers immediately before the impact analysis starts
Answer Description
You are hired to do an analysis on the systems to determine the impact of a malicious actor. Hardening and wiping the servers is outside of the scope of this analysis, but may be a recommended next step based on your findings. The logical step is to determine which servers are the most critical based on the data hosted on them, and begin analyzing them one-by-one in order of most important/critical data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to prioritize servers based on data importance?
What is the role of a cybersecurity analyst in an incident response?
Why is hardening servers not the first step in impact analysis?
Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?
Bolster the organization's data loss prevention (DLP) strategies
Enhance the cryptographic assurance using public key infrastructure (PKI)
Incorporate additional security information and event management (SIEM) features
Implement a system with automatic threat mitigation capabilities
Answer Description
To address the limitation of a system that only provides notifications when a potential breach occurs, implementing a solution that can take preventative action is necessary. An Intrusion Prevention System is designed to not only detect but to preventively respond to threats by blocking them, therefore enhancing the network's defensive capabilities. The options of bolstering data loss prevention (DLP) strategies, incorporating additional security information and event management (SIEM) features, and enhancing public key infrastructure (PKI) are all valuable in their respective contexts. However, none of these solutions are purposed to block malicious traffic in the way an Intrusion Prevention System would. DLP focuses on preventing data leaks, SIEM centralizes logging and provides threat detection, and PKI deals with encryption and authentication, not inline traffic analysis and intervention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Intrusion Prevention System (IPS)?
How does an IPS differ from a firewall?
What are some typical features of an IPS?
A software development company wants to allow its users to log into a third-party code repository from their in-house development platform. The company aims to facilitate this without sharing user credentials with the third-party service. Which protocol is best suited to allow the company's platform to request access to the third-party service on behalf of the user?
Open Authorization (OAuth)
Lightweight Directory Access Protocol (LDAP)
Remote Authentication Dial-In User Service (RADIUS)
Terminal Access Controller Access-Control System Plus (TACACS+)
Answer Description
Open Authorization, commonly known as OAuth, is best suited for this purpose. OAuth is a protocol that enables applications to obtain limited access to user accounts on an HTTP service without passing user credentials to the application. It works by using access tokens provided by the authorization server, which mediate the authentication of the end user by the information provider.
- LDAP (Lightweight Directory Access Protocol) is primarily used for accessing and maintaining distributed directory information services over an IP network, which is not the goal in this scenario.
- RADIUS (Remote Authentication Dial-In User Service) provides centralized authentication, authorization, and accounting for users who connect and use a network service, but does not cater to the specific needs of application-to-application authorization.
- TACACS+ (Terminal Access Controller Access-Control System Plus) provides detailed accounting information and flexible administrative control over authentication and authorization processes, but it is not designed for delegating user authorization between web services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is OAuth and how does it work?
What is the difference between OAuth and LDAP?
What are access tokens in OAuth, and why are they important?
A large organization has implemented several security measures to protect its network infrastructure. As part of their continuous monitoring strategy, they want to ensure that any unauthorized access or anomalies in their network traffic are quickly identified and investigated. Which of the following security measures would best serve this purpose?
Increase frequency of anti-virus software updates on all endpoints.
Conduct regular security training sessions for all network administrators.
Implement an Intrusion Detection System (IDS) to monitor network traffic.
Deploy additional firewalls to segment network traffic.
Answer Description
Intrusion Detection Systems (IDS) are designed to monitor network and system activities for malicious activity or policy violations. A well-configured IDS can detect numerous types of malicious network traffic and computer usage that often go unnoticed by a firewall, which makes it an excellent choice for identifying unauthorized accesses or anomalies. Anti-virus software, while useful for detecting and removing malware, does not generally monitor network traffic for anomalies. Firewalls are preventive controls that block unauthorized access based on predefined rules but do not perform post-passage anomaly detection. Security training is essential for personnel but does not continuously monitor network traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Intrusion Detection System (IDS)?
How does an IDS differ from a firewall?
What types of threats can an IDS detect?
An administrator needs to securely access and manage servers located in an isolated, high-security network segment. To minimize the attack surface, direct administrative access from the general corporate network is prohibited. Which of the following should be used to provide a controlled and monitored entry point for this purpose?
Jump server
Load balancer
Proxy server
VPN concentrator
Answer Description
A jump server, also known as a jump host or bastion host, is a hardened server that acts as a secure intermediary and single point of entry for administrators to connect to other devices in a separate security zone. This approach centralizes access control and monitoring.
A proxy server primarily acts as an intermediary for user requests to other servers (like web servers), but it is not specifically designed for administrative access sessions. A load balancer distributes incoming traffic across multiple servers to improve availability and performance but does not serve as a secure administrative gateway. A VPN concentrator is used to establish secure, encrypted tunnels for remote access, but it typically provides broader network-level access rather than the specific, audited host-to-host administrative access that a jump server provides.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a jump server and how does it work?
What is a DMZ in network security?
Why are jump servers important for security management?
A company is evaluating options for remote employees to securely access the corporate network. Which of the following solutions would provide the BEST security for sensitive corporate data while maintaining reliable connectivity?
Utilizing remote access software without two-factor authentication for user convenience
Installing a jump server that remote employees can connect to before accessing the corporate network
Implementing a Virtual Private Network (VPN) with strong encryption standards for remote connections
Allowing remote access through a basic tunneling protocol with no additional encryption
Answer Description
A Virtual Private Network (VPN) creates a secure tunnel between the remote user's device and the corporate network, encrypting data in transit, which helps protect sensitive corporate data from eavesdropping and man-in-the-middle attacks. Remote access and tunneling protocols can be part of a VPN solution, emphasizing the importance of encryption and a secure tunnel. A jump server, even though it acts as a bridge between different security zones, does not inherently encrypt traffic and is less suited as a comprehensive solution for remote employees' secure connectivity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Virtual Private Network (VPN)?
What are strong encryption standards in VPNs?
What are the risks of using basic tunneling protocols without encryption?
In an effort to streamline client interaction processes, a business is transitioning to a sophisticated platform designed for this purpose. The analytics division requires permissions to generate reports and review client data, while the account management division needs the ability to engage with and alter client records. What is the BEST strategy for assigning the appropriate level of system access in accordance with each division's responsibilities?
Institute a policy where access is determined by the seniority of the personnel within the organization
Grant all divisions the same level of access to simplify management of the new platform
Utilize a predefined set of roles that are specific to user job functions to regulate access within the platform
Allow division heads to grant access as they see fit for their respective teams
Answer Description
The best strategy is to assign access rights according to the functions necessary for each job role within the new platform. The analytics division should receive a viewing and reporting role to access and analyze data without the risk of altering it, enhancing data integrity. Conversely, the account management division should be given a more comprehensive role that encompasses the creation, viewing, updating, and deletion of client records, aligned with their day-to-day account maintenance and client interaction tasks. This access control mechanism follows the principle of 'least privilege,' granting users only the permissions necessary to perform their jobs, which is a fundamental aspect of secure role assignments. Using 'RBAC' without explaining its meaning or acronym form could lead to confusion for those unfamiliar with the term, highlighting the necessity for clarity in both teaching and testing environments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does RBAC stand for, and how does it work?
What is the principle of 'least privilege'?
Why is it risky to grant all divisions the same level of access?
Which of the following best describes the process where a system or individual proves their identity by providing credentials to a verifying entity?
Authentication
Accounting
Authorization
Multifactor
Answer Description
Authentication is the correct term for the process where an entity (user, system, or process) proves its identity to a verifying entity by providing the appropriate credentials. Authorization refers to the granting of rights and permissions post-authentication, and accounting refers to the tracking of user activities, while multifactor indicates a means or type of authentication, not the process itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of credentials used in authentication?
What is the difference between authentication and authorization?
What is multifactor authentication (MFA) and why is it important?
When using security controls, at times you will need additional controls to make up for the shortcoming of existing controls. This is called what kind of control?
Compensating
Preventive
Detective
Corrective
Answer Description
When an existing security control is found to not mitigate risk down to an acceptable level, a compensating control can be used to bring the risk to the desired level.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of compensating controls?
How do compensating controls differ from preventive, detective, and corrective controls?
Why is it important to implement compensating controls?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.