CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
An organization relies on specialized industrial control systems to manage its critical operations. Which of the following is the BEST practice to enhance the security of these systems against cyber attacks?
Enforce strong password policies for system accounts
Conduct regular security awareness training for operators
Isolate the industrial control systems on a separate network segment
Install antivirus software on control devices
Answer Description
Isolating industrial control systems on a separate network segment is the best practice to protect them from cyber threats. Network segmentation limits exposure by separating sensitive systems from other networks, reducing the risk of unauthorized access and malware spread. While enforcing strong password policies, installing antivirus software on control devices, and conducting regular security training are beneficial, they do not provide the same level of protection against network-based attacks as network isolation does.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is network segmentation important for industrial control systems?
How does isolating control systems reduce the risk of unauthorized access?
What additional security measures can complement network segmentation?
A digital forensics investigator is collecting evidence from a compromised workstation. Which action best maintains the chain of custody?
Encrypt the evidence to protect it from unauthorized access.
Record the date, time, and individuals who handle the evidence.
Analyze the evidence on the original workstation to maintain context.
Use write-blocking devices to prevent data alteration.
Answer Description
Recording the date, time, and individuals who handle the evidence ensures a documented trail, which is crucial for maintaining the chain of custody. This documentation verifies that the evidence has not been tampered with and is admissible in court. While other actions like using write-blocking devices are important for preserving evidence integrity, they do not directly address the documentation aspect of the chain of custody.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the chain of custody in digital forensics?
Why is documentation of evidence handling so important?
What are write-blocking devices, and why are they used?
A system administrator needs to ensure that known security vulnerabilities in their software can be addressed promptly using solutions provided by the vendor. Which consideration is most relevant in this scenario?
Patch availability
Ease of recovery
Compute capacity
Resilience
Answer Description
'Patch availability' is the correct consideration because it refers to the ability to obtain and apply vendor-provided patches or updates to fix security vulnerabilities. Ensuring that patches are available and can be applied promptly is essential for maintaining system security and integrity. 'Ease of recovery' pertains to restoring systems after failures, 'Compute capacity' relates to the processing resources of the systems, and 'Resilience' refers to the ability to withstand and recover from adverse conditions. None of these directly address the need to obtain and apply solutions to known vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are security vulnerabilities and why do they matter?
What is a vendor-provided patch?
What is the process of applying a patch?
What type of physical security control is primarily utilized for authenticating personnel through the analysis of unique personal attributes before granting access to highly secure areas?
Biometric systems
Fencing
Access Control Vestibule
Sensors
Answer Description
Access Control Vestibule is a security measure that separates two spaces allowing for an individual verification process, but it is not based on personal biometric attributes. Fencing is a deterrent and boundary control rather than a personal authentication mechanism. Sensors can detect and alert on various environmental factors but are not used to authenticate individual personal attributes. Biometric systems, such as fingerprint or retina scanners, are designed to authenticate individual personnel by verifying unique personal attributes, making them a key physical security control for highly secure areas.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of biometric systems used for authentication?
How do biometric systems ensure the accuracy of authentication?
What are the advantages and disadvantages of using biometric systems for security?
A security administrator performs a weekly audit of firewall rules and user permissions on network shares. This proactive, hands-on review process is an example of which category of security control?
Managerial control
Physical control
Operational control
Technical control
Answer Description
The correct answer is operational control. Operational controls are security measures implemented and managed by people in their day-to-day work. The act of an administrator regularly reviewing firewall rules and user permissions is a human-centric process focused on maintaining security, which is the definition of an operational control. Technical controls are the technologies themselves, like the firewall or the access control list system. Managerial controls are the high-level policies and procedures, such as a policy that mandates weekly reviews. Physical controls are tangible measures like fences or locks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are access control lists (ACLs) important in security operations?
What are some common challenges in maintaining access control lists?
What can happen if access control lists are not regularly updated?
Under what type of control would you classify antivirus software?
Physical
Technical
Operational
Administrative
Answer Description
Antivirus is a technical control. It is software installed on the computer whose job it is to protect the system against viruses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are technical controls in cybersecurity?
How does antivirus software protect a system?
What are some examples of technical controls besides antivirus software?
What is the primary function of ticket creation as part of security operations?
To maintain systems and software configurations across the enterprise.
To document and track reported security incidents or issues until they are resolved.
To manage the delivery of IT services to users within the company.
To assess and analyze potential security risks within the organization.
Answer Description
Ticket creation serves as the initial step in documenting and tracking reported security incidents or issues within an organization. It ensures that each incident is recorded, assigned a unique identifier, and managed effectively through to resolution. By contrast, risk assessment is a broader process that identifies, evaluates, and prioritizes risks. Configuration management deals with maintaining systems and software in known, good states. IT service management (ITSM) is a general term that encompasses the management of all IT services, with ticket creation being one component of that broader category.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the steps involved in the ticket creation process for security incidents?
How does ticket creation help in improving an organization's security posture?
What tools are commonly used for ticket creation in security operations?
A corporation managing critical infrastructure needs to safeguard its operational technology environment. Among the following choices, which measure would most effectively enhance the defense of their control systems?
Implement network segmentation to isolate the control systems from other less secure networks.
Disable all unnecessary services and ports on the devices managing the industrial processes.
Encrypt all stored data pertaining to operational procedures and configurations.
Institute a strict schedule for applying updates to the control system software during operational hours.
Answer Description
Network segmentation is the most effective choice for enhancing the defense of control systems because it creates boundaries that limit communications with less secure or external networks. This isolation is crucial for environments that manage critical processes, as it not only minimizes the potential attack surface but also contains the spread of any intrusion, thereby safeguarding essential services. While disabling unused services, applying regular updates, and encrypting storage are all important security practices, they do not provide the same level of systemic protection or containment against network-based threats that segmentation offers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation and how does it work?
Why is it important to isolate control systems from other networks?
What are other best practices for securing control systems beyond segmentation?
Which of the following is the BEST approach to ensure ongoing compliance and security posture of a third-party vendor post-contract signing?
Define strict SLAs and consider the vendor monitoring process complete.
Rely solely on the vendor-supplied compliance reports.
Perform regular independent audits of the vendor's practices.
Implement only vendor-supplied security tools for monitoring.
Answer Description
Conducting regular audits of the vendor's practices ensures that they maintain compliance with agreed-upon standards and policies over the duration of the relationship. While vendor-supplied compliance reports are useful, they may not always be as rigorous as independent audits. Service-Level Agreements (SLAs) primarily define service delivery expectations, not security compliance measures. Complete reliance on vendor-supplied security tools does not provide independent verification of security posture and could leave gaps in compliance monitoring.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are independent audits?
What are Service-Level Agreements (SLAs) and how do they relate to security?
Why can't I rely solely on vendor-supplied compliance reports?
An important component of digital forensics, this must be documented and be accurate to keep any evidence legally admissible and unable to question its integrity.
Legal hold
Preservation
Chain of custody
E-discovery
Answer Description
Chain of custody requires that as potential evidence changes hands each transfer must be documented. Chain of custody should include who has custody and the time frame it was in their custody.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is chain of custody in digital forensics?
Why is accurate documentation important for chain of custody?
What happens if the chain of custody is broken?
Which of the following security functions is provided by DomainKeys Identified Mail (DKIM)?
It encrypts the entire email message during transit to ensure confidentiality.
It blocks email from unauthorized IP addresses by checking the envelope sender against an allow list.
It verifies that the message body and attachments have not been altered since the sender signed the message.
It enforces domain-level policies instructing receivers how to handle failed SPF and DKIM checks.
Answer Description
DKIM adds a cryptographic signature to selected headers and the entire message body, which includes any MIME attachments. When the recipient's server retrieves the sender's public key from DNS and verifies the signature, it can confirm that the signed portions of the message-including attachments-have not been altered in transit. DKIM does not encrypt email content, block senders by IP address, or impose domain-wide handling rules for failed checks; those capabilities are provided by TLS, SPF, and DMARC, respectively.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does DKIM stand for and how does it work?
What are SPF and DMARC and how do they work with DKIM?
What is the importance of DNS in DKIM authentication?
A security analyst is reviewing the physical security controls for a new data center. To protect the main entrance from vehicle-based threats, the analyst recommends installing bollards. Which type of security control do bollards primarily represent?
Corrective
Detective
Preventive
Compensating
Answer Description
Bollards are a type of physical security control designed to prevent an incident from occurring. In this case, they physically block unauthorized vehicles from ramming the building's entrance, making them a preventive control. Detective controls (e.g., alarms, surveillance), corrective controls (e.g., disaster recovery plans), and compensating controls (e.g., using a different security measure when the primary one fails) serve different purposes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are bollards and how do they work in security?
What are some other security measures that should be included with bollards?
What does a multi-layered security approach involve?
Which governance structure in information security is characterized by decision-making authority being concentrated at higher organizational levels rather than distributed among individual departments or teams?
Centralized governance structure
Matrix governance structure
Decentralized governance structure
Federated governance structure
Answer Description
A centralized governance structure concentrates security-related decisions in a single authority-often executive management or a dedicated security office-ensuring uniform policy enforcement across the enterprise. In contrast, decentralized, federated, or matrix approaches delegate significant authority to separate business units or project teams.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the advantages of a centralized governance structure?
What are the disadvantages of a decentralized governance structure?
Can you explain what factors might lead an organization to choose a centralized governance structure?
An organization needs to ensure that its most critical systems are protected from external network threats and unauthorized access. Which of the following methods provides the MOST secure way to achieve this level of isolation?
Install a firewall to filter traffic between these systems and other networks
Employ network address translation (NAT) for these devices
Use a VLAN to segment these systems from the corporate network
Implement an air-gapped network for these systems
Answer Description
Implementing an air-gapped network means these critical systems are physically disconnected from any other networks and the internet, providing the highest level of isolation. This prevents remote access and network-based attacks. While using VLANs, firewalls, or NAT can enhance security through logical segmentation and filtering, they do not offer the same level of isolation because the systems remain connected to other networks, potentially exposing them to threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an air-gapped network?
What are VLANs and how do they enhance security?
What role does a firewall play in network security?
During the analysis phase of an incident, an analyst is tasked with determining the scope of a suspected breach on several servers. Which data source will MOST likely provide the comprehensive information required to assess the activities on the affected servers?
Vulnerability scans
Firewall logs
Packet captures
Operating system-specific security logs
Answer Description
Operating system-specific security logs are designed to record events that are significant to the security of the operating system. They can provide detailed information about the activities on a server, such at login attempts, access to protected objects, and changes to security policies. These logs are more likely to give an accurate picture of the scope of a suspected breach compared to the other options, which may provide too broad or peripheral view, or lack the level of detail necessary for an analysis of server activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What kind of information do operating system-specific security logs typically contain?
How are packet captures different from operating system-specific security logs?
Why are firewall logs less effective for determining the scope of a suspected breach on servers?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.