CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test
- 20 Questions
- Unlimited
- General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following algorithms is a symmetric encryption algorithm?
DSA
Diffie-Hellman
RSA
Twofish
Answer Description
Only Twofish is a symmetric-key block cipher that uses the same key for encryption and decryption. Diffie-Hellman, RSA, and DSA all rely on public-key (asymmetric) cryptography and therefore do not meet the requirement of being symmetric.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is symmetric encryption?
How does Twofish encryption work?
What are the main differences between symmetric and asymmetric encryption?
A medium-sized organization is expanding rapidly and requires a solution to streamline the creation and management of user accounts across multiple services, including email, cloud storage, and internal databases. As the security operations manager, you decide to implement a tool to automate these repetitive tasks. Which of the following solutions would be the MOST appropriate to achieve this objective?
Password manager
Simple Network Management Protocol (SNMP) manager
Security Information and Event Management (SIEM) system
Identity and Access Management (IAM) solution
Answer Description
An Identity and Access Management (IAM) solution is the most appropriate because it enables centralized management of user identities and automates provisioning and de-provisioning across multiple systems. This saves time, minimizes human error, and enforces consistent access policies, thereby improving both operational efficiency and security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Identity and Access Management (IAM) solution?
How does IAM improve security in an organization?
Why isn’t a password manager suitable for this scenario?
Why is it important to change default passwords when configuring new devices or systems?
To ensure the device remains under warranty by complying with manufacturer policies
To allow the device to receive automatic security updates for firmware
To guarantee compatibility with other devices on the network through standardized passwords
To prevent unauthorized access by those who might know the commonly used default passwords
Answer Description
Default passwords are often publicly known and can be easily discovered by attackers through manuals or online databases, leaving devices and systems vulnerable to unauthorized access. Changing default passwords to unique, strong passwords is essential for securing the device against unauthorized access or control. Using default passwords does not provide adequate security because they can be quickly exploited by threat actors who have knowledge of these defaults.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are default passwords, and where can attackers find them?
What are the characteristics of a strong password, and why does it matter?
What could happen if default passwords are not changed on a network device?
As the IT security specialist for your company, you have noticed an unusual increase in employees reporting suspicious emails that attempt to lure them into providing their login credentials. The email claims that the company's email system is undergoing maintenance and employees need to log in to a special portal to continue having access to their emails. Which type of attack is most likely occurring?
Phishing
Smishing
Vishing
Typosquatting
Answer Description
This scenario describes a phishing attack, which is a form of social engineering where attackers masquerade as a trustworthy entity in an email to distribute malicious links or gather sensitive information like login credentials. The described situation fits the classic pattern of a phishing attempt through email, exploiting the credibility of 'system maintenance' to deceive employees into providing their information. It is not a vishing attack because that involves using phone calls to obtain confidential information. Smishing attacks involve the use of SMS texts, not emails. While typosquatting could be used in conjunction with phishing, it specifically involves registering domains that are slight misspellings of legitimate company domains and there is no mention of this detail in the scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common signs of a phishing email?
How is phishing different from vishing and smishing?
How can organizations defend against phishing attacks?
A security administrator at a small warehouse needs a control that allows staff to monitor and record any unauthorized after-hours entry so they can alert law enforcement rather than physically confronting intruders. Which physical control would BEST meet this requirement?
Surveillance cameras
Keypad door locks
Mantrap
Bollards
Answer Description
Surveillance cameras provide continuous visual coverage, enabling staff to detect and verify unauthorized activity from a safe location while also recording evidence. They serve as both a deterrent and a detective control. Bollards are intended to stop or slow vehicles but do not provide visual monitoring. Keypad door locks regulate entry but offer no real-time visibility into an attempted breach. A mantrap limits access to one person at a time but typically lacks external video coverage of wider areas, so it does not satisfy the requirement for remote visibility.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How do surveillance cameras act as a deterrent?
What is the difference between a physical control like surveillance cameras and an access control such as keypad door locks?
When should a mantrap be used instead of surveillance cameras for security purposes?
What type of NIDS commonly uses artificial intelligence and data mining to identify malicious network traffic?
Anomaly-based NIDS
Filter-based NIDS
Rule-based NIDS
Signature-based NIDS
Answer Description
An anomaly-based Network Intrusion Detection System (NIDS) detects unusual network traffic after first being 'trained' on normal network traffic. Theses systems use data mining and artificial intelligence to classify traffic as normal or anomaly/potentially malicious.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does anomaly-based NIDS use artificial intelligence?
What is the difference between anomaly-based and signature-based NIDS?
What is data mining in the context of NIDS?
An IT department wants to reduce the time it takes to grant new employees access to necessary systems and applications by automating this process. Which use case of automation and scripting best addresses this need?
Security groups
Ticket creation
Continuous integration and testing
User provisioning
Answer Description
User provisioning automates the creation of user accounts and the assignment of appropriate access rights, effectively streamlining the onboarding process. While ticket creation can help manage access requests, it does not automate the provisioning itself. Continuous integration and testing are related to software development practices, and security groups organize users but do not automate access provisioning.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is user provisioning in automation?
How does user provisioning differ from ticket creation?
What role do security groups play in user provisioning?
For an upcoming security audit, a junior administrator must apply basic hardening steps to fifty Windows and Linux workstations that will be issued to remote employees. Which of the following actions represents a fundamental system-hardening control that should be completed before deployment?
Enable guest accounts on each system to simplify initial user logins.
Install all vendor-supplied security updates and critical patches.
Configure the host firewall to allow all outbound ports by default.
Create a local administrator account with the same strong password on every workstation.
Answer Description
Applying all vendor-supplied security updates and critical patches ensures that known vulnerabilities in the operating system and installed applications are remediated before the systems are exposed to users or the internet. Enabling guest accounts, opening all outbound firewall ports, or using the same local administrator password across machines would each increase the attack surface and therefore do not constitute proper hardening.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is regularly updating systems considered a best practice for security?
What is the risk of using vendor-supplied default passwords on devices?
How does disabling a firewall decrease system security?
A system administrator has been notified that an audit has found certain files containing proprietary source code to be accessible by all employees through a shared network drive. The source code should only be accessible to members of the development team. To align with best practices for permissions management, which of the following actions should the system administrator implement FIRST to remediate this issue?
Set up an alert system to monitor file access patterns and flag any unauthorized attempts
Initiate a company-wide training on the importance of data confidentiality
Modify the permissions on the files to restrict access solely to the development team
Disable the shared network drive until a full user account review can be performed
Answer Description
The first and most effective action to address the issue is to modify the permissions on the files to ensure that only the development team has access. This alteration directly addresses the problem identified during the audit by enforcing proper access controls, thereby preventing unauthorized access to sensitive information. Disabling the shared network drive would remove access for the authorized development team and is not a precise method of access control. Performing a user account review may surface additional issues but will not rectify the immediate concern of unauthorized access to the proprietary source code. Monitoring the file access patterns is a reactive approach and would not prevent further unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is modifying permissions the first step in securing sensitive files?
What is the principle of least privilege and how does it apply here?
What tools or methods can be used to modify file permissions effectively?
A company's new data protection policy mandates that all databases containing customer personally identifiable information (PII) must be encrypted. Following this directive, the IT department enables transparent data encryption (TDE) on the relevant SQL servers. Which statement accurately describes the relationship between the policy and the encryption?
The policy and the encryption are both examples of operational controls.
The encryption is a compensating control that replaces the need for a policy.
The policy is a technical control, and the encryption is a managerial control.
The policy is a managerial control that guides the implementation of the technical control (encryption).
Answer Description
The correct answer is that the policy serves as a managerial control that guides the implementation of the technical control (encryption). Managerial controls, such as policies and procedures, establish the security requirements and framework for an organization. Technical controls are the specific hardware or software mechanisms, like encryption, used to enforce those policies. The other options are incorrect because the roles are not reversed, the encryption is not a compensating control in this context, and the controls belong to different categories (managerial and technical), not both operational.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of managerial controls?
How do technical controls enforce managerial controls?
Why is it important to combine managerial and technical controls?
A developer is building a new web application with a user registration form. To prevent attackers from submitting malicious scripts or SQL commands through the form fields, which of the following security techniques should be prioritized for implementation on the server-side?
Implementation of least privilege in code execution
Input validation
Secure cookie implementation
Static code analysis
Answer Description
Input validation is the process of ensuring that a program operates on clean, correct, and useful data. It uses rules to check for data correctness, meaningfulness, and security before the data is processed by the application. This technique is a primary defense against a wide range of data manipulation attacks, such as SQL injection, buffer overflows, and cross-site scripting (XSS), which often originate from user-submitted data. The other options are also important for application security but serve different functions. Static code analysis finds vulnerabilities in source code before runtime, secure cookie implementation protects session data, and the principle of least privilege limits the potential damage from an exploit rather than preventing the initial input-based attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SQL injection?
How does input validation help prevent buffer overflows?
What is the difference between input validation and static code analysis?
A security analyst is reviewing a report from a recent vulnerability scan that identified over 200 issues across various systems, including web servers, databases, and network switches. To manage the remediation process effectively, the analyst groups the vulnerabilities based on common characteristics, such as the type of weakness (e.g., SQL injection, cross-site scripting) and the affected technology stack. What is this process of categorizing vulnerabilities called?
Vulnerability scoring
Vulnerability classification
Vulnerability indexing
Vulnerability enumeration
Answer Description
Vulnerability classification is the process of systematically categorizing security weaknesses based on their nature, such as the type of flaw (e.g., buffer overflow, misconfiguration) or the affected system. This allows an organization to group similar issues, assign them to the correct teams, and develop a prioritized and organized approach to remediation. Vulnerability scoring, like CVSS, assigns a severity score but does not categorize the vulnerability type. Vulnerability enumeration, like CVE, involves identifying and listing individual vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between vulnerability classification and vulnerability scoring?
What role does CVE play in vulnerability management?
How does vulnerability classification improve remediation efforts?
A network administrator is hardening a new web server and must configure the firewall to allow secure web traffic. Which TCP port should the administrator open to allow HTTPS connections by default?
80
3389
443
143
Answer Description
The correct answer is port 443. Hypertext Transfer Protocol Secure (HTTPS) is the standard protocol for secure web communication and uses TCP port 443 by default. Port 80 is used for unencrypted HTTP traffic. Port 143 is the default for Internet Message Access Protocol (IMAP), which is used for email retrieval. Port 3389 is used for Remote Desktop Protocol (RDP).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why does HTTPS use port 443 by default?
What is the difference between HTTP (port 80) and HTTPS (port 443)?
How does a firewall handle port configurations for HTTPS?
Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?
Start documenting the details of the breach and response actions taken.
Notify the company's legal team and prepare for public disclosure.
Immediately isolate affected systems to stop the spread of the breach.
Prioritize the review of security logs to trace the origin of the attack.
Answer Description
The initial focus in the event of a security breach should be to limit the damage and prevent further compromise. This is achieved by containing the threat, thereby stopping the incident from affecting additional resources. While documenting the events and notifying appropriate parties are also important, these actions occur after the immediate threat has been controlled to prevent exacerbation of the situation. Analyzing logs is part of the subsequent investigation and not the immediate concern when a breach is in progress.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is isolating affected systems the primary action in a data breach?
What are the steps to isolate affected systems?
Why is reviewing security logs not the immediate priority during a breach?
Your organization is a U.S.-based e-commerce retailer that sells products to customers in the European Union and California and allows employees to work remotely from Brazil. The security manager must design a privacy compliance program that minimizes legal exposure while keeping operations as simple as possible. Which of the following strategies BEST accomplishes this goal?
Rely exclusively on user consent pop-ups to satisfy all international privacy obligations.
Maintain separate privacy policies and technical controls for each jurisdiction but enforce them only in the local office located there.
Implement a single privacy program that meets the most stringent requirements across GDPR, CCPA/CPRA, and LGPD, and apply it to all data processing worldwide.
Comply only with U.S. federal privacy laws because the company is incorporated in the United States.
Answer Description
Because the company processes personal data of EU residents, California residents, and Brazilian employees, it falls under the extraterritorial scopes of the GDPR, CCPA/CPRA, and Brazil's LGPD. Building one privacy framework that satisfies the strictest overlapping requirements (for example, GDPR's consent rules, LGPD's data-subject rights, and CCPA opt-out mechanisms) and applying it globally reduces complexity and the risk of missing a jurisdiction-specific obligation. Limiting compliance to U.S. federal laws ignores extraterritorial statutes; maintaining separate policies for each location is error-prone and resource-intensive; relying solely on consent pop-ups fails to address breach-notification, security, and data-subject access requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the GDPR, and why is it considered strict?
How does LGPD differ from GDPR?
What are the key features of CCPA/CPRA?
An administrator is configuring permissions for a new network share according to the principle of least privilege. Members of the accounting department must be able to add and edit files in the folder. Members from the auditing and sales departments should only be able to review the contents. Which set of permissions should the administrator assign to the accounting, auditing, and sales groups, respectively?
Full control for accounting, Read & execute for auditing, Write for sales
Write for accounting, Read for auditing and sales
Read & execute for accounting, Write for auditing, Modify for sales
Modify for accounting, Read & execute for auditing, Read for sales
Answer Description
The correct set of permissions adheres to the principle of least privilege. The accounting department's requirement to 'add and edit files' is best met with the 'Write' permission. The auditing and sales departments' requirement to 'review the contents' is met with the 'Read' permission. Using 'Read & execute' would be excessive for the auditing and sales teams as there is no requirement to run programs from the share. Granting 'Modify' or 'Full control' to the accounting department would also violate least privilege, as these permissions include rights (like deletion or changing permissions) that were not specified in the requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
What is the difference between 'Read' and 'Read & execute' permissions?
Why is 'Write' permission appropriate for the accounting department in this scenario?
When considering the security implications of hardware and software inventory management, which of the following is a direct consequence of NOT regularly updating the inventory of an organization's computing resources?
Increased difficulty in managing software licenses and compliance
Challenges in provisioning adequate resources for new employees
Heightened risk of security breaches due to unmanaged or unknown assets
Difficulties in the physical retrieval of devices for maintenance tasks
Answer Description
Regularly updating an organization's computing resource inventory is essential for identifying and managing vulnerabilities, as well as ensuring the security posture is up-to-date. Failure to maintain an updated inventory increases the risk of incidents because unmanaged, unknown, or unpatched resources can become vectors for security breaches. It is less about physical tracking or license compliance, and more about understanding what needs to be protected and ensuring appropriate security measures are in place.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it essential to regularly update an organization's hardware and software inventory?
What are examples of 'unmanaged or unknown assets' in an organization?
What tools can organizations use to maintain accurate hardware and software inventories?
A company's primary file server was encrypted by a ransomware attack, making all files inaccessible. The IT department responded by isolating the server, removing the malware, and successfully restoring the data from the previous night's backup. This restoration of data is an example of which type of security control?
Detective
Compensating
Preventive
Corrective
Answer Description
Corrective controls are implemented to reduce the impact and fix issues after a security incident has occurred. In this scenario, restoring the files from a backup is a corrective action because it remediates the damage caused by the ransomware attack. Preventive controls, like firewalls or antivirus software, are designed to stop an incident from happening. Detective controls, such as system logs or intrusion detection systems, are used to identify that an incident is occurring or has occurred. Compensating controls are alternative measures used when a primary control is not feasible.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of corrective controls?
How do corrective controls differ from preventive controls?
Why are corrective controls important for business continuity?
A security team needs to ensure its cloud infrastructure consistently adheres to regulatory standards like PCI-DSS and internal security policies. The team requires a method that provides ongoing visibility into its compliance status. Which of the following is the BEST approach to meet this requirement?
Deploying an automated tool that continuously scans configurations and provides real-time compliance alerts.
Mandating annual security and compliance training for all cloud engineering and operations staff.
Creating a dedicated channel for employees to report potential compliance gaps and suggest policy updates.
Scheduling quarterly manual audits of system configurations and access logs to identify non-compliance issues.
Answer Description
Automated compliance tools are the best method for continuous monitoring as they can scan configurations and activities in real-time, providing immediate alerts on non-compliance. This allows for rapid remediation. Quarterly manual audits are periodic, not continuous, and can miss issues that arise between checks. While essential, compliance training is a preventative measure that builds awareness rather than a monitoring function. A feedback channel is a useful process for policy improvement but does not actively monitor the infrastructure for compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are automated compliance monitoring tools?
How do automated tools differ from manual compliance checks?
What are some key features to look for in compliance monitoring tools?
Which of these is a primary benefit of implementing automation in secure operations?
Standardized risk spread throughout the organization
Reduction of complexity
Efficiency/time saving
Guaranteed cost reduction
Answer Description
Efficiency/time saving is a primary benefit of automation because it allows for quicker execution of repetitive tasks, reduces the potential for human error, and frees up personnel to focus on more complex tasks that cannot be automated. In contrast, complexity, cost reduction, and risk spread by automation are effects or considerations that can be associated with automation, but they are not universally accepted as primary benefits. Complexity actually refers to the potential increase in system complexity due to automation. Cost can sometimes be reduced by automation due to labor savings, but this isn't a guaranteed benefit because initial setup and maintenance can be costly. Risk spread is not a term commonly associated with the benefits of automation in secure operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of tasks are typically automated in secure operations?
How does automation reduce human error in secure operations?
Are there any challenges associated with implementing automation in secure operations?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.