CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
An enterprise is evaluating new servers from various vendors for a high-security environment. Which of the following criteria should be prioritized to BEST ensure the hardware provider meets the company's stringent security policies and risk management?
Choosing hardware providers that the enterprise has worked with in the past
Ensuring the hardware provider has no direct affiliations with foreign governments
Obtaining comprehensive documentation for all hardware components
Validating the security of the server's firmware at the time of delivery
Answer Description
Validating the security of the server's firmware at the time of delivery is critical, as firmware vulnerabilities can compromise the entire system. Ensuring that the hardware provider has a secure firmware delivery and update process helps protect against supply chain attacks. While obtaining documentation, checking for government connections, and working with familiar brands provide different levels of assurance, they do not offer the same direct mitigation against hardware-based vulnerabilities and firmware integrity as validating the server's firmware security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is firmware and why is its security important?
What are supply chain attacks, and how do they relate to server hardware?
What is the process for validating firmware security from a hardware provider?
A government agency is implementing an access control system for its classified data. The system must enforce a strict, centrally managed policy where access decisions are based on security labels (e.g., 'Confidential', 'Secret', 'Top Secret') assigned to both users and data objects. End-users must not be able to alter permissions for the resources they create. Which access control model best meets these requirements?
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Answer Description
The correct answer is Mandatory Access Control (MAC). MAC is a centralized access control model where the system enforces access based on security labels assigned to subjects (users) and objects (data). This model is common in high-security environments like government and military agencies, as described in the scenario. In a MAC system, users cannot change permissions, which aligns with the requirement. Discretionary Access Control (DAC) is incorrect because it allows resource owners to set permissions at their discretion. Role-Based Access Control (RBAC) bases access on a user's job function or role, not directly on data classification labels. Attribute-Based Access Control (ABAC) is a dynamic model that uses multiple attributes for access decisions, but MAC is the specific model defined by the use of centrally-enforced security clearance labels.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security labels in Mandatory Access Control systems?
How does Mandatory Access Control differ from Discretionary Access Control?
Why is Mandatory Access Control important for security?
Your company is engaging a vendor to develop a proprietary network security solution. Which document is primarily responsible for defining the tasks to be completed, the deliverables expected, and a timeline for when these milestones should be achieved?
Agreement for Services
Confidentiality Agreement
Partnership Agreement
Statement of Work
Answer Description
The correct document for outlining the specific tasks, deliverables, and timeline in a vendor agreement is the Statement of Work. This document plays a crucial role in setting clear expectations and project details before work commences, ensuring that both parties are aligned on what is to be delivered, when, and in what manner. An agreement for services, on the other hand, defines the level of service performance and quality assurances rather than detailing the project specifics. A confidentiality agreement focuses on the protection of proprietary and sensitive information shared during the engagement and does not detail project specifics. A partnership agreement outlines the general terms of the partnership and cooperation between two entities, which again does not focus on the provision of services for a particular project like a Statement of Work does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components included in a Statement of Work?
How does a Statement of Work differ from an Agreement for Services?
Why is a Statement of Work essential in vendor engagements?
Which term describes the requirement to control access to data based on the physical location of the user accessing the data or the location of the data processing?
Data sovereignty
Geolocation restrictions
Data residency
Data classification
Answer Description
Geolocation restrictions are security controls that limit access to data based on the geographical location from where the data access attempt is made or where the data processing takes place. This ensures that data remains within legal or regulatory boundaries and that an organization maintains compliance with local laws.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are geolocation restrictions and how are they implemented?
What is the difference between data sovereignty and geolocation restrictions?
Can you explain data residency and how it relates to geolocation restrictions?
Which of the following options is a vendor-neutral standard for message logging?
Event manager
SNMP
syslog
SIEM
Answer Description
Syslog is a vendor-neutral standard for message logging. It includes a standard format for log messages and a network protocol for sending that data to a central logging server. It is widely used by network devices like routers, switches, and firewalls, and on Unix and Linux operating systems. The other options are incorrect. A Security Information and Event Management (SIEM) system collects and analyzes logs but is not the logging standard itself. Simple Network Management Protocol (SNMP) is a protocol for network management, not a logging standard. 'Event manager' refers to proprietary systems like the Windows Event Viewer, not a vendor-neutral standard.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is syslog used for?
What are the benefits of using a vendor-neutral standard like syslog?
How does syslog differ from SIEM?
As a Security Manager at a financial firm, you have been tasked with developing an initial reporting mechanism for employees to communicate potential security issues. You aim to ensure maximum participation while maintaining the effectiveness of the reports being submitted. Which of the following options would be the most effective approach to begin this reporting protocol?
Set up physical drop boxes throughout the workplace where employees can leave written reports.
Develop a web portal that requires multi-factor authentication for employees to submit reports electronically.
Create specifically designated social media channels where employees can post reports.
Establish a dedicated hotline and an accessible email address for incident reporting.
Answer Description
The most effective initial reporting mechanism for security incidents is the establishment of a dedicated hotline and an accessible email address. This approach provides employees with a clear and direct path to report issues quickly. A hotline allows for immediate communication, which is valuable in time-sensitive situations, while an accessible email address gives employees who are hesitant to speak up a way to report concerns discretely. Social media channels, while popular for customer outreach, are not private and could inadvertently expose sensitive information to the public, disqualifying it as a secure initial reporting mechanism. The use of physical drop boxes is not recommended for immediate issues as it may lead to delays in reporting, rendering them less effective. While having a web portal for reporting can be useful as part of a comprehensive reporting framework, it often requires training and access not all employees may have from the onset, especially in a finance firm's context where security policies may restrict access to certain web applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of using a dedicated hotline for reporting security issues?
Why is it important to have an accessible email address for incident reporting?
What are some potential risks of using social media for incident reporting?
What is a primary benefit of using automation in security operations?
Decreases the need for continuous integration and testing
Increases the complexity of security controls
Ensures that security operations staff have more technical obstacles to manage
Improves efficiency and saves time by handling repetitive tasks
Answer Description
Automation helps improve efficiency and saves time by performing repetitive tasks quickly and with consistency, which is a significant benefit in security operations. It allows security teams to focus on more strategic tasks that require human intervention. Incorrect answers may seem like plausible benefits but do not capture the fundamental advantage of automation which is efficiency and time saving.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of repetitive tasks can be automated in security operations?
What is the role of Security Information and Event Management (SIEM) in automation?
How does automation help security teams focus on more strategic tasks?
A financial services company must comply with an industry regulation that requires an independent review of their security posture. Which of the following BEST ensures the company’s ongoing compliance with this requirement?
Conducting a self-assessment using internal resources
Incorporating a right-to-audit clause in third-party vendor agreements
Generating internal compliance reports quarterly
Performing an independent third-party audit
Answer Description
An independent third-party audit is the correct response because it involves an external entity reviewing the organization's compliance with required standards, regulations, and controls, thereby providing an unbiased assessment of the company's security posture. This type of audit is specifically useful for meeting regulatory compliance that mandates external validation of security practices. A right-to-audit clause is commonly included in contracts and would allow the company to audit third-parties, but is not the appropriate tool for an external review of the company itself. Internal compliance reporting, while necessary, does not fulfill the requirement for an independent review. Similarly, self-assessments are conducted internally and lack the independent aspect required by the regulation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an independent third-party audit?
Why is it important to have an independent review of security posture?
What are common industry regulations that require independent audits?
During an investigation, which method ensures that the evidence collected remains admissible in court by documenting the control, transfer, analysis, and disposition of the digital evidence from the time of acquisition?
Chain of custody
Acquisition
Reporting
Legal hold
Answer Description
Chain of custody is a legal concept that refers to the chronological documentation or paper trail, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence. Maintaining the chain of custody is vital to ensure that the evidence can be trusted and is admissible in a court of law. If the chain of custody is broken or cannot be proven, the integrity of the evidence may be questioned, potentially rendering it inadmissible. Legal hold is a process that preserves all forms of relevant information when litigation is reasonably anticipated, which differs from ensuring the evidence admissibility. Both acquisition and reporting are steps within the digital forensics process, but they do not serve to maintain the integrity of the evidence through documentation like chain of custody does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific documentation is included in the chain of custody?
Why is breaking the chain of custody a significant concern in legal cases?
How does chain of custody differ from legal hold?
A systems administrator has just implemented a new feature into the company's web application. The following week, a security patch is released for the software version that was used to develop the feature. What action should the administrator take to keep the application current while minimizing risk to service stability?
Roll back the new feature to prioritize installation of the patch.
Immediately deploy the patched software version company-wide.
Perform regression testing on the new feature with the patched software version before deployment.
Ignore the patch and continue feature development to avoid compatibility issues.
Answer Description
Regression testing the new feature against the patched software in a non-production environment verifies that the patch does not break existing functionality. Once tests pass, the combined update can be deployed to production with confidence. Deploying the patch immediately could disrupt the new feature, ignoring the patch leaves the system vulnerable, and rolling back the feature sacrifices business value without addressing security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is regression testing?
What are the risks of skipping regression testing?
How can regression testing be conducted effectively?
During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?
Containment
Recovery
Eradication
Lessons learned
Answer Description
Containment is the correct answer because the immediate priority in incident response, following detection and analysis, is to contain the incident to prevent further damage or spread of the threat. Eradication and Recovery are subsequent steps that cannot be effectively performed unless the threat is first contained.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does containment mean in incident response?
Why is eradication a subsequent step and not the first priority?
What are the key phases of incident response after containment?
Which statement best describes the role of a risk owner within an organization's risk management program?
Reviews risk reports at set intervals but is otherwise not involved in risk treatment activities.
Acts only as a subject-matter expert with no authority to choose or approve risk responses.
Has ultimate accountability for the risk and coordinates mitigation efforts, but may delegate day-to-day control implementation to appropriate personnel.
Personally implements all technical and administrative controls required to treat the risk.
Answer Description
A risk owner is the individual ultimately accountable for a specific risk. The owner must ensure the risk is identified, assessed, and that suitable treatment plans are in place, but the hands-on implementation of controls is typically carried out by control or treatment owners (e.g., IT or security staff). Therefore, the correct option is the one that highlights accountability and coordination rather than direct execution of every mitigation task. The distractors either overstate personal execution duties, understate authority, or limit involvement to periodic review.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are risk owners responsible for?
What does risk mitigation involve?
Why is collaboration important in risk management?
Which security model emphasizes verifying every access request, reducing the attack surface by eliminating implicit trust, and enforcing strict access policies based on identity and context?
Role-Based Access Control
Discretionary Access Control
Mandatory Access Control
Zero Trust Model
Answer Description
The Zero Trust Model focuses on continuously verifying users and devices before granting access, thereby reducing the attack surface by eliminating implicit trust. It enforces strict access policies based on identity, context, and risk assessment. Role-Based Access Control (RBAC) assigns permissions based on predefined roles without necessarily verifying each access request or reducing implicit trust. Discretionary Access Control (DAC) allows resource owners to grant access at their discretion, which may not enforce strict identity verification. Mandatory Access Control (MAC) enforces access based on classifications and clearances, not adaptively on identity and context.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of the Zero Trust Model?
How does the Zero Trust Model differ from traditional security models?
What are some technologies used to implement the Zero Trust Model?
During an acquisition, your company is tasked with evaluating the security measures of the company to be acquired. Which type of assessment is MOST appropriate to determine that the company meets your security requirements?
Internal self-assessment
External penetration testing
Quantitative risk analysis
Due diligence review
Answer Description
A vendor assessment, particularly a due diligence review, is the most appropriate type of assessment when evaluating a company during an acquisition. This review ensures that the company to be acquired is compliant with necessary security standards and that there are no hidden security liabilities. Penetration testing focuses on finding vulnerabilities in systems and networks and may not cover the broad scope of security measures in place. Self-assessments are internal evaluations and might not provide an objective view needed during an acquisition. Risk analysis is part of the overall risk management process but does not serve as a comprehensive review of a company's security measures during an acquisition scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a due diligence review in the context of an acquisition?
How does a vendor assessment differ from penetration testing?
Why might internal self-assessments be insufficient during an acquisition?
A security analyst is reviewing the company's disaster recovery plan (DRP). The analyst notes that the DRP focuses heavily on restoring critical business functions but lacks a comprehensive inventory of IT hardware, software, and data assets. Which of the following BEST describes the risk associated with this omission?
Recovery efforts may be delayed and incomplete because there is no detailed inventory to guide prioritization and restoration.
The DRP's effectiveness is not impacted, as the primary goal of restoring business functions makes a specific asset inventory redundant.
Recovery will be faster as teams can focus on broad functions rather than being slowed down by the details of specific assets.
The lack of an inventory primarily represents a financial risk for insurance claims but does not affect the technical recovery process.
Answer Description
A detailed and current asset inventory is a foundational component of an effective disaster recovery plan. Without it, an organization cannot accurately prioritize which systems to restore first, understand dependencies between assets, or ensure that all necessary components are recovered. This leads to inefficient and delayed recovery efforts, potentially preventing the organization from meeting its Recovery Time Objectives (RTOs). The inventory is essential for knowing what needs to be restored to bring critical business functions back online.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is having a detailed asset inventory crucial for disaster recovery?
What types of information should be included in an asset inventory?
How does an asset inventory help in risk assessment and management?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.