CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A company posts large signs that read "This area is under video surveillance" around its server room, and the CCTV cameras themselves are mounted in plain sight. Which type of security control do these two measures MOST directly represent?
Corrective control
Detective control
Preventive control
Deterrent control
Answer Description
Both the visible signs and the plainly mounted cameras are intended to influence human behavior by making would-be intruders think twice before acting. They raise the perceived risk of being identified and caught, thereby discouraging an attack. Because their primary purpose is psychological discouragement rather than physical prevention, detection, or post-incident recovery, they are classified as deterrent controls. Detective controls (such as audit logs) identify events that have already occurred, preventive controls (such as door locks) stop access outright, and corrective controls (such as restoring from backups) limit damage after an incident.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are deterrent controls in security?
How do deterrent controls differ from preventive controls?
Why are plainly visible CCTV cameras considered deterrent controls?
System logs show that one employee account has two active sessions: one originating from New York, USA and another from Singapore only minutes apart-far too quickly for the user to have physically traveled. Which security concern does this situation most likely indicate?
Time-of-check vs. time-of-use race conditions
Concurrent sessions from multiple locations
Amplified DDoS attack leveraging multiple endpoints
Credential spraying across the network
Answer Description
Multiple active sessions from widely separated locations suggest that the same credentials are being used by more than one party at the same time. This indicator, known as concurrent session usage (or impossible travel), often points to stolen or shared credentials and should trigger an investigation or automatic mitigation steps such as step-up authentication or forced log-out. The other choices describe different attack types or symptoms that do not match simultaneous, geographically disparate logins.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is concurrent session usage, and why is it a security concern?
What is step-up authentication, and how can it mitigate concurrent session risks?
What is 'impossible travel,' and how does it relate to detecting credential theft?
Before beginning a penetration test, a document must be established to outline the boundaries and methods of the test. Which document is specifically designed for this purpose?
A detailed document specifying tasks to be completed under a contract, often as part of a larger agreement
A document that outlines the delivered services, their standards, and the legal framework for ongoing relationships
A document that specifies the actions, scope, methods, and protocols to be adhered to during a penetration test
A document that formalizes the mutual understanding and general intent of the collaborating parties
Answer Description
The Rules of Engagement document is critical in penetration testing as it outlines the scope, methods, timeline, and contact points, and it defines what activities are permitted during the test. This mitigates the risk of unauthorized or unintended actions that could cause harm to the organization or lead to legal complications. While service agreements, memorandums, and work statements have their respective places in the formalization of services, they do not provide the detailed rules and limitations required for a penetration test.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Rules of Engagement (RoE) document in penetration testing?
Why is the Rules of Engagement document important in cybersecurity testing?
What is the difference between a Rules of Engagement document and a Service Level Agreement (SLA)?
Your company has historically avoided issuing company-owned mobile or wireless devices. A new initiative now seeks to provide laptops to employees, but leadership requires that any data stored locally on the device be encrypted at all times. Which type of drive would meet this requirement?
Full-disk encryption software (BitLocker)
Self-encrypting drive (SED)
RAID 0 array
Virtual private network (VPN)
Answer Description
A self-encrypting drive (SED) contains dedicated hardware in its controller that automatically encrypts every bit of data written to the disk and decrypts it transparently when read. Because the cryptographic operations occur on the drive itself rather than through the host CPU or software, the entire contents-including the operating system, applications, and user files-remain fully encrypted at rest. The other options do not provide built-in, hardware-level full-disk encryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does an SED (Self-Encrypting Drive) differ from software-based encryption?
What happens if the encryption key for an SED is lost?
Can SEDs protect data if the laptop is stolen while powered on?
During a security governance workshop, a company is mapping roles to responsibilities for its new payroll application and the underlying database. According to best practices for systems and data governance, which role is responsible for approving and overseeing the development, maintenance, use, and security controls of these assets?
Third-party service providers who process data on behalf of the data owner or controller.
Teams responsible for performing regular audits and compliance checks on data management practices.
Personnel who physically interact with the data on a daily basis, ensuring its accuracy and integrity.
An individual or entity that has approved management responsibility for controlling the production, development, maintenance, use, and security of assets.
Answer Description
In systems and data governance, the owner is the individual or entity that has formal, management-approved responsibility for an asset throughout its life cycle. That responsibility includes ensuring the asset is properly developed, maintained, secured, and used, and that appropriate access controls and other safeguards remain in place. Custodians interact with the data day to day, processors handle data on behalf of a controller or owner, and audit teams merely verify compliance; none of those groups carry the full life-cycle accountability that defines ownership.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a data owner and a data custodian?
What access control responsibilities does a data owner have?
How does the data owner’s role align with compliance and regulatory requirements?
During a third-party risk assessment your organization develops its own vendor security questionnaire. The form is tailored to the service being purchased and asks detailed questions about authentication, data protection, and incident response, but it is not explicitly mapped to any well-known framework such as NIST CSF or ISO/IEC 27001.
Which statement BEST describes the role of security frameworks in this situation?
Using a framework is discouraged because it makes questionnaires too lengthy and compliance-focused.
Mapping each question to a recognized framework is mandatory; without it the questionnaire cannot be considered reliable.
Framework mapping is required only when assessing cloud service providers; it is unnecessary for other vendor types.
Framework mapping is helpful, but a well-tailored questionnaire that covers the vendor's relevant risk areas can still be effective without a formal cross-reference.
Answer Description
A questionnaire can still be an effective assessment tool without a formal cross-reference to a framework-provided the questions elicit adequate evidence about the controls that matter for the vendor's specific risk profile. Mapping to a framework is helpful for consistency and coverage, but it is not an absolute requirement; effectiveness depends on how well the questionnaire addresses the organization's risk tolerance, regulatory drivers, and the vendor's service scope. Framework alignment simply offers one proven method to reach that goal.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a security framework, and why is it useful?
Why is it not mandatory to map questionnaires to a security framework like NIST CSF?
How does tailoring a questionnaire help in vendor assessments?
Which of the following physical security measures is primarily used to monitor and record activity for later review?
Video Surveillance
Bollards
Lighting
Access Control Vestibule
Answer Description
Video surveillance is primarily used to monitor and record activity for later review. It can act as both a deterrent and a tool for forensic analysis after a security incident. Bollards are used as a barrier to protect against vehicle ramming attacks. An access control vestibule is a security feature that controls two or more interlocking doors. Lighting is used to enhance visibility and deter unauthorized access, but does not record activity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does video surveillance act as a deterrent?
What are the key differences between an access control vestibule and video surveillance?
How does video surveillance complement other physical security measures like lighting or bollards?
A financial company has decided to implement an additional security layer for accessing its internal customer database system to ensure that only authenticated and authorized employees can view sensitive customer information. The system now requires an access code from a hardware token in addition to the username and password. This change primarily strengthens which element of AAA?
Authorization
Authentication
Accounting
Non-repudiation
Answer Description
The correct answer is 'Authentication' because the implemented access code from a hardware token is an additional authentication factor that must be presented along with the username and password. This is known as multi-factor authentication (MFA), which significantly increases the security by requiring multiple forms of verification before granting access.
The incorrect choices are: 'Authorization' refers to granting or denying rights to a user, resource, or service once authentication has been successful. 'Accounting' involves tracking user activities and resource usage, which could be for billing or auditing purposes. 'Non-repudiation' ensures that a person or entity cannot deny sending a message or transaction, which is not directly enhanced by the addition of a hardware token.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is multi-factor authentication (MFA)?
How does a hardware token work in authentication?
Why doesn't implementing a hardware token strengthen 'authorization' or 'non-repudiation'?
What is the purpose of a security key in multifactor authentication?
A software tool that records the keystroke dynamics of a user for continuous authentication.
An application on a user's device that sends a verification code via SMS messages.
A physical device that, when presented, serves as a second factor by verifying the user's possession.
An algorithm embedded within the user's computer that generates one-time passwords.
Answer Description
A security key is a physical device that provides a second factor of authentication for a user accessing a service. As a "something you have" factor, it is a core component of multifactor authentication (MFA), which requires at least two verification factors to enhance account security. While physical tokens can include devices like key fobs or smart cards, modern security keys typically connect via USB, NFC, or Bluetooth and use advanced cryptographic protocols like FIDO2 to resist phishing attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a security key enhance security in comparison to SMS-based authentication?
What is FIDO2 and how does it work with security keys?
What are the different types of connections used by modern security keys?
After normal business hours, an administrator notices an abnormal pattern of login failures affecting several high-privilege accounts. The source of these attempts shifts methodically across a range of network addresses. Which characteristic of these security events should the administrator prioritize for further investigation?
Repeated login failures pointing to a potential configuration error.
The methodical shift across a range of network addresses indicating automation.
The high-privilege account lockouts due to suspected user error.
An issue with the authentication service failing to validate credentials.
Answer Description
The methodical shift across a range of network addresses from which the login failures originate is a strong indicator of automation, commonly seen in attack patterns like credential stuffing. Attackers often use large sets of compromised username and password pairs against various user accounts to find matches. This pattern is less likely to be caused by user errors, which would typically not exhibit such precise changes in source locations, nor would they be expected to focus on high-privilege accounts specifically. Additionally, a configuration error or an issue with the authentication service would unlikely lead to systematic login attempts from changing network locations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is credential stuffing?
Why do attackers target high-privilege accounts?
How can administrators detect and respond to automated login attempts?
Your organization has implemented strong internal controls to manage sensitive customer data. During a routine internal audit, you discover that a newly implemented software tool does not comply with the established encryption standards. What is the next step to maintain compliance?
Immediately cease using the tool across the organization until it complies with encryption standards.
Request a feature update from the software tool vendor to accommodate the required encryption standards without internal notification.
Document the issue and wait for the next external audit to confirm the non-compliance before taking action.
Report the non-compliance issue to the compliance department for review and correction.
Answer Description
The correct step after discovering a non-compliance issue in an internal audit is to report the issue to the appropriate department or individual responsible for compliance. This initiates the process of addressing the non-compliance, which may include a review of the issue, adjusting the non-compliant system, or implementing additional controls to ensure that it meets the organization's encryption standards. It is central to the concept of internal compliance reporting that such issues are promptly and effectively communicated to enable swift corrective action.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to report non-compliance issues immediately?
What is encryption, and why is it critical for sensitive customer data?
What role does the compliance department play in managing issues like these?
A corporation is evaluating the possible financial impact of an internal network compromise. With the internal network assets valued at $2 million, which of the following best illustrates the 'Exposure Factor' for this risk assessment?
The $2 million total value of the network assets that are at risk.
The annual amount required to insure the $2 million worth of network assets against compromise.
The likelihood, expressed as a percentage, that the network assets will be compromised each year.
The estimated percentage of the $2 million that would be lost if the network is compromised.
Answer Description
Exposure Factor is the percentage of the asset's value that is estimated to be lost due to a security incident. It represents the magnitude of the impact should a security breach occur in terms of the asset's value. In this scenario, identifying the percentage of the $2 million in assets that would potentially be lost during a network compromise is a direct application of the 'Exposure Factor' concept.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Exposure Factor in risk assessment?
What is the difference between Exposure Factor and Single Loss Expectancy?
How is Exposure Factor used in the risk assessment process?
A systems administrator must remotely manage a Linux server that can be reached only over the public internet. Which of the following protocols will provide an encrypted channel that protects the administrator's credentials and all session data from eavesdropping?
HTTP
SSH
Telnet
SNMPv1
Answer Description
Secure Shell (SSH) establishes an encrypted session-typically over TCP port 22-that protects login credentials and all commands exchanged between the client and the server. Telnet, HTTP, and SNMPv1 transmit data in plaintext, making them vulnerable to interception and man-in-the-middle attacks. For that reason, SSH is the industry-standard choice for secure remote administration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SSH, and why is it considered secure?
How does SSH differ from Telnet?
Why are plaintext protocols like Telnet, HTTP, and SNMPv1 less secure than SSH?
A company is enhancing its disaster recovery strategies to improve its ability to maintain continuity of operations after a catastrophic system failure. Considering the importance of being able to resume mission-critical activities swiftly and efficiently, which of the following options should be the company's MAIN focus?
Transitioning to a warm site that can be operational within a few days of an incident
Setting up a cold site with basic infrastructure and no pre-installed systems
Implementing more frequent backups of all critical systems
Establishing a hot site to facilitate immediate failover
Answer Description
Hot sites are fully equipped data centers that can take over functionality from the primary site immediately or within a minimal time frame after a disaster. This allows for continuity of operations and a swift return to normal activities, which is crucial for maintaining mission-critical processes during an unplanned interruption. Cold sites, while less expensive, require more time to set up and are not ideal for immediate failover. Warm sites offer a middle ground but still involve a delay in resumption compared to hot sites. While backups are important, they are typically used to restore data and do not by themselves ensure operational continuity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a hot site, cold site, and warm site in disaster recovery?
Why are hot sites more expensive compared to cold or warm sites?
How do hot sites ensure immediate failover in disaster recovery?
Which of the following best describes a scenario where an individual has the right to have their personal data erased from an organization's database upon request?
Right to Be Forgotten
Ownership Assertion
Data Subject Access
Data Inventory and Retention
Answer Description
'Right to Be Forgotten' is a privacy principle that allows individuals to request the deletion of their personal data from an organization's records.This relates to the control individuals have over their personal data and the obligations of the data controller.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is meant by 'Right to Be Forgotten' in data privacy?
Under what conditions can an organization refuse a 'Right to Be Forgotten' request?
How does 'Right to Be Forgotten' differ from 'Data Subject Access'?
As a security consultant evaluating an organization's data management practices, you determine that there is a need to appoint an individual responsible for making decisions about the data, establishing control mechanisms, and determining data classification levels. Which role is best suited for these responsibilities?
Processor
Owner
Controller
Custodian/Steward
Answer Description
The Owner of the data is responsible for making decisions about the data, establishing control mechanisms, and determining data classification levels. They are accountable for ensuring that the data is properly protected and used in compliance with legal and organizational requirements. The Processor is responsible for processing data on behalf of the Controller as per their instructions. The Custodian (also known as the Steward) is responsible for maintaining and protecting the data assets on a day-to-day basis. The Controller determines the purposes for which and the means by which personal data is processed but may not own the data or the process.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of a Data Owner in an organization?
How does the role of a Data Custodian differ from a Data Owner?
What is the role of a Data Processor in data management?
Which type of threat actor is MOST likely to engage in activities aiming to obtain sensitive information from an organization to demand payment in return for not releasing the information?
Organized crime
Nation-state
Hacktivist
Unskilled attacker
Answer Description
A Blackmail motivation typically involves the threat of revealing sensitive information unless a demand (often for payment) is met, which aligns with the modus operandi of organized crime groups. Organized crime syndicates are known for seeking financial gain through coercion and intimidation, making them the most likely to engage in blackmail. Nation-state actors, while possessing the capability for such actions, are usually driven by espionage or political objectives. Unskilled attackers often lack the expertise to obtain and leverage sensitive information effectively, and hacktivists are generally motivated by political or social objectives, not financial gain through extortion.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What distinguishes organized crime from other threat actors like nation-states or hacktivists?
How do organized crime groups acquire the sensitive information they use for blackmail?
What preventive measures can organizations take to protect against blackmail by organized crime groups?
An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?
Data exfiltration
Revenge
Espionage
Financial gain
Answer Description
Financial gain is the likely motivation because the attacker can use or sell the stolen credit card information for monetary profit. Espionage involves obtaining confidential information for strategic advantage, typically in a political or corporate context, which is not indicated here. Revenge would suggest the attacker has a personal vendetta against the company, but there is no such indication. Data exfiltration refers to the unauthorized transfer of data, but in this context, it's the means rather than the motivation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between financial gain and data exfiltration in a cyberattack?
How do attackers monetize stolen credit card information?
How is espionage different from other cyberattack motivations like financial gain?
What is the primary purpose of implementing automation in vulnerability management processes?
To completely eliminate user error in vulnerability management.
To ensure manual processes are the primary method for vulnerability detection.
To increase efficiency and consistency in vulnerability detection and response.
To eliminate the necessity of establishing secure baselines for systems.
Answer Description
The primary purpose of implementing automation in vulnerability management is to increase efficiency and consistency in identifying and responding to security vulnerabilities. Automated tools can consistently monitor systems for known vulnerabilities, help in scheduling scans, and manage patch deployment without the need for manual intervention. While automation certainly helps in maintaining minimum security baselines and reduces the chances of user error, its main role in the context of vulnerability management is to streamline the detection and remediation of vulnerabilities within a system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common tools used in automated vulnerability management?
How does automation improve consistency in vulnerability management?
What limitations should organizations consider when implementing automation in vulnerability management?
Which of the following options is a vendor-neutral standard for message logging?
syslog
SIEM
Event manager
SNMP
Answer Description
Syslog is a vendor-neutral standard for message logging. It includes a standard format for log messages and a network protocol for sending that data to a central logging server. It is widely used by network devices like routers, switches, and firewalls, and on Unix and Linux operating systems. The other options are incorrect. A Security Information and Event Management (SIEM) system collects and analyzes logs but is not the logging standard itself. Simple Network Management Protocol (SNMP) is a protocol for network management, not a logging standard. 'Event manager' refers to proprietary systems like the Windows Event Viewer, not a vendor-neutral standard.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the primary purpose of syslog?
How does syslog differ from SIEM?
What is the role of SNMP compared to syslog?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.