CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A development team is implementing a 'shift-left' security strategy to identify vulnerabilities early in the software development lifecycle (SDLC). The team wants to analyze the application's source code for security flaws, such as potential SQL injection and buffer overflows, without executing the program. Which of the following techniques should the team use?
Web application firewall (WAF)
Fuzzing
Dynamic Application Security Testing (DAST)
Static Application Security Testing (SAST)
Answer Description
Static Application Security Testing (SAST) is the correct technique because it analyzes an application's source code or binaries for security vulnerabilities without running the program. This allows developers to find and fix issues like SQL injection and buffer overflows early in the SDLC, which is the core principle of 'shift-left' security. Dynamic Application Security Testing (DAST) analyzes applications in their running state, while fuzzing involves providing invalid or unexpected data to a running application to see if it crashes. A web application firewall (WAF) is a network security control that protects web applications from attacks at the network edge; it does not analyze source code.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common security vulnerabilities that static analysis tools can detect?
How do static analysis tools differ from dynamic analysis tools?
Can static analysis tools replace manual code reviews?
A company has a policy to repurpose its storage devices internally before considering disposal. When preparing storage devices that were used for sensitive projects for repurposing within a less critical department, which measure should be employed to minimize the risk of data exposure?
Degauss the drives to disrupt the magnetic field and render the data unreadable.
Perform a standard antivirus scan to ensure the absence of malware.
Conduct a secure erasure conforming to a stipulated industry standard for data sanitization.
Reformat the drives using the quick format option to prepare for immediate reuse.
Answer Description
The correct measure when repurposing storage devices that previously contained sensitive data is to conduct a secure erasure process that adheres to industry standards (e.g., NIST SP 800-88), ensuring that the data recovery is not possible without extraordinary measures. Degaussing is also a method to sanitize data, but it's suitable for magnetic drives only and might not be practicable for solid-state drives (SSDs). Reformatting the drive is not secure enough, as most standard formatting procedures leave data recoverable. Running a standard antivirus scan, although important for detecting and removing malware, does not address the need to prevent data recovery from the storage device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is secure erasure and why is it important?
What are some industry standards for data sanitization?
What is the difference between reformatting a drive and secure erasure?
Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?
The software could be useful for productivity, hence poses no significant risk.
This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.
The employees may use this software regularly, which could lead to potential data leaks.
This software can take up disk space, but it does not pose any security concerns.
Answer Description
Pre-installed software that is not necessary for the user's activities-commonly called bloatware-can pose a security risk if it contains unpatched vulnerabilities. Because this software is often unmanaged, it can increase the device's attack surface. Attackers may exploit flaws in the unused software or its background services even if employees never actively launch the applications. Therefore, the main concern is the presence of potentially vulnerable code, not how frequently employees use the software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are vulnerabilities in software?
What is bloatware and why is it a concern?
How can companies securely manage pre-installed software on devices?
A healthcare organization based in California is expanding its services to a neighboring state with distinct data privacy laws. To ensure compliance with the new regional regulations, which element of effective security governance should the organization prioritize updating?
Enhancing physical security measures at the new location
Implementing a global encryption standard across all offices
Updating the Information Security Policies to include state-specific compliance requirements
Revising the Incident Response plan based on national guidelines
Answer Description
Updating the Information Security Policies to include state-specific compliance requirements ensures that the organization adheres to local data privacy laws. This adjustment aligns the company's policies with the legal obligations of the new region, mitigating the risk of non-compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Information Security Policies?
Why is it important to comply with state-specific data privacy laws?
What are some common challenges organizations face when updating their security policies?
A company's proprietary application is critical for daily operations, but it runs on an operating system that no longer receives vendor updates. The company's IT team is currently unable to upgrade the system or migrate the application due to compatibility issues. What is the most effective risk mitigation strategy the IT team should implement to secure the legacy system against potential threats?
Conduct regular security audits on the system to ensure compliance with security policies
Implement network segmentation and restrict the system's network connectivity to essential services
Increase security monitoring specifically targeting the unsupported system to detect anomalies
Encourage users to employ stronger passwords for system access
Answer Description
Implementing network segmentation and limiting the legacy system's connectivity to essential services is the correct answer. This approach reduces the risk of attacks from both internal and external threat vectors, as it would prevent the potentially compromised system from affecting unrelated parts of the network. While increasing security monitoring is a useful tactic, it does not directly mitigate the exposure of the legacy system to threats. Conducting regular security audits on the system is a good practice, but it does not provide real-time protection against threats. Encouraging the use of strong passwords is important but does not address the specific risks associated with an unsupported operating system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation, and why is it important for securing legacy systems?
What are essential services, and how do you determine what they are for a legacy system?
What are some potential risks associated with using an unsupported operating system?
A security analyst is reviewing data handling policies for their organization. They need to ensure that data stored on hard drives, SSDs, and backup tapes is properly encrypted. Which of the following data states correctly describes this type of data?
Data in use
Data in process
Data at rest
Data in transit
Answer Description
Data at rest is the term for data that is not actively moving from device to device or network to network. This includes data stored on media such as hard drives, SSDs, and backup tapes. Data in transit is data actively moving across a network. Data in use refers to data that is currently being processed by a CPU or is in memory.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'data at rest' typically include?
What are the security measures for protecting data at rest?
What is data in transit, and how does it differ from data at rest?
A company is implementing multifactor authentication to enhance security for their VPN access. Which of the following provides the BEST example of a 'Something you are' factor?
Hardware token
Fingerprint scan
Access badge
Personal Identification Number (PIN)
Password
Voice recognition
Answer Description
A fingerprint scan is the best example of the 'Something you are' factor because it utilizes a unique physical characteristic of the user, which is considered a biometric method. These types of methods are based on the individual's unique biological traits and are therefore difficult to replicate or share, enhancing security. A hardware token and an access badge are examples of 'Something you have,' while a PIN and a password are examples of 'Something you know.' Voice recognition could be considered a 'Something you are' factor, but biometric methods like fingerprint scans have wider acceptance and typically provide stronger security due to decreased error rates and lower chances of mimicry.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometric methods?
How does multifactor authentication improve security?
What differentiates 'Something you have' from 'Something you are' in authentication?
Your team is in the process of developing a new web application. As a security specialist, you are tasked with performing an assessment to identify potential security flaws. Which technique would allow you to analyze the behavior of the application during execution to identify unexpected outcomes, vulnerabilities or security violations?
Conducting a run-time evaluation of the web application with a variety of inputs and analysing the response
Inspecting and interpreting web application firewall logs to identify potential security issues
Utilizing a configuration compliance scanner to ensure that the servers meet the company's baseline security standards
Performing a detailed review of the source code of the web application before it is compiled
Answer Description
Dynamic analysis involves examining the behavior of an application at runtime. It is more practical and comprehensive for understanding how an application behaves with various inputs in real-time, which is essential for discovering a wide range of potential security issues, including the ones that only arise when a program interacts with an operating system or other applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is dynamic analysis in security testing?
What are some common tools used for dynamic analysis?
How does dynamic analysis differ from static analysis?
An organization’s IT department noticed that specific entries that should be present in the security logs are missing, and there are sudden gaps in the logs’ regular time intervals. In the absence of any scheduled maintenance or known service disruptions, what is the MOST likely explanation for this disparity?
The logging service crashed due to a software error, thus not recording data.
Log generation was paused due to insufficient storage space.
Logs were deliberately deleted or altered by an attacker.
The log retention policy automatically purged older log entries.
Answer Description
The most likely explanation for missing log entries is that they were deliberately deleted or altered to conceal unauthorized activities or a security breach. Attackers often cover their tracks by manipulating logs after gaining access to a system to avoid detection. This is a tactic used in post-exploitation to maintain stealth and prolong unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common methods attackers use to delete or alter logs?
What are the consequences of not having proper logging mechanisms in place?
How can organizations improve their logging practices to prevent log tampering?
A company has various security policies and controls in place. Which of the following is the BEST action to take to ensure these policies and controls remain effective and aligned with current threats?
Conduct regular reviews and updates of security policies and controls
Install the latest antivirus software on all company devices
Provide comprehensive security training to all employees on a weekly basis
Limit user privileges to the minimum necessary for job performance
Answer Description
Regularly reviewing and updating policies and controls is the correct answer because it allows an organization to address new threats and changes in the operational environment. It ensures that the policies and controls continue to be relevant and effective. While employee training, installing antivirus software, and limiting user privileges are important security practices, they do not directly ensure that policies and controls are kept up-to-date with the current threat landscape.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are regular reviews of security policies important?
What are some common changes that might require policy updates?
How can organizations effectively communicate updates to security policies?
An international company must keep its clients’ personal information in regions where data is collected. Which approach enforces location-based requirements for data storage?
Rely on customized encryption keys stored in a different territory
Use a hosting service physically located in each region to store local records
Deploy widely distributed servers that automatically copy data to any node
Protect data with advanced credentials and a robust login policy
Answer Description
Storing data within a country’s own data center or approved hosting service ensures data does not leave that territory, meeting legal compliance. Methods such as strong passcodes do not guarantee data remains in a location. Encryption is valuable for confidentiality but does not constrain the physical location of data. Replicating data globally may violate those region-specific obligations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are location-based requirements for data storage?
How does using a hosting service in each region ensure compliance?
What are the risks of using encryption for data location compliance?
A company's primary data center located in a hurricane-prone area has just experienced a significant storm, leading to a sustained power outage and compromised physical infrastructure. The company relies on a combination of on-site back-ups and replication to an off-site data center for their disaster recovery strategy. Given these details, which of the following would BEST ensure the continuation of business operations during this event?
Implementing incremental backups until the primary data center is restored and operational.
Waiting until the primary data center is restored to resume critical business operations.
Activating the business continuity plan which includes failing over to the off-site data center.
Restoring operations from onsite backups as soon as connectivity is re-established.
Answer Description
The correct answer is 'Activating the business continuity plan which includes failing over to the off-site data center.' This is because a well-prepared business continuity plan accounts for geographical risks such as natural disasters, and the existence of an off-site data center implies that the company has planned for replication and failover processes which can be activated when the primary site is non-operational. In contrast, relying solely on onsite backups will not suffice because the compromised infrastructure and ongoing power outage hinder the company's ability to restore systems locally. Incremental backups without replication would not address the immediate need to maintain operations since the data and systems are still within the affected area. Similarly, awaiting the restoration of the primary data center is not a viable strategy as it does not address the need for immediate business continuity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a business continuity plan?
Why is failing over to an off-site data center important during a disaster?
What does data replication mean in disaster recovery?
What is the common title for senior management members responsible for overseeing data in their domain?
Data protector
Data manager
Data owner
Data administrator
Answer Description
Data owners are usually individuals in senior management and have overall responsibility for the data within their area of the organization. The data owner for HR data would typically be senior staff within the HR department.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key responsibilities of a data owner?
How does the role of a data owner differ from that of a data administrator?
What types of organizations typically have data owners?
Which of the following is the BEST description of the purpose of version control in the context of change management and security?
To manage and control software code, configurations, and other artifacts
To quickly identify and resolve issues caused by recent changes
To automatically update documentation and diagrams when changes are made
To facilitate collaboration between different teams and departments
Answer Description
Version control is primarily used to manage and control different versions of software, configurations, and other artifacts. It allows for tracking changes, reverting to previous versions if needed, and maintaining a clear audit trail of modifications. While version control can help with documentation, collaboration, and identifying issues, its main purpose is to effectively manage and control versions of various assets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are artifacts in version control?
How do version control systems help with collaboration?
What are some popular version control systems?
What type of attack involves manipulating a system into using a less secure encryption protocol to then exploit weaker cryptographic implementation?
Buffer overflow attack
Replay attack
Downgrade attack
Man-in-the-middle attack
Answer Description
A downgrade attack is when an attacker forces a system to revert to a lesser, often outdated and less secure protocol, making the communication more susceptible to compromise. This differs from other attacks that do not aim to change the security protocol level but rather exploit existing vulnerabilities or capture data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of less secure encryption protocols that might be exploited in a downgrade attack?
How does a downgrade attack differ from a man-in-the-middle attack?
What are some defenses against downgrade attacks?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.