CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which approach aligns with the security principle that dictates user permissions should be limited to the bare minimum necessary to accomplish their work tasks?
Providing users with read-write access to all network devices
Granting full rights to all users to avoid performance bottlenecks
Assigning permissions based strictly on job requirements
Applying time-of-day restrictions to user logins
Answer Description
The principle of least privilege is about limiting user permissions to the most restrictive set necessary to perform job duties, thus mitigating the potential risk and impact of a security incident. Granting full rights regardless of role would violate this principle. Time-of-day restrictions are a form of access control but do not inherently limit the scope of access rights to essential tasks. Read-write access to all network devices would provide excessive privileges that are not aligned with the principle.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the principle of least privilege?
Why is it important to limit user permissions?
What are the consequences of not following the principle of least privilege?
Which solution aggregates logs and other security data from various hardware and software systems in an organization to assist in identifying and managing potential security incidents?
Intrusion Detection System
Security Information and Event Management system
Network Management with Simple Network Management Protocol traps
Data Loss Prevention system
Answer Description
A Security Information and Event Management system collects and correlates events from different sources across the organization's infrastructure to identify aberrant activities that may signify security threats. The incorrect options do not primarily focus on aggregating and analyzing data from multiple resources to identify security incidents; Data Loss Prevention focuses on protecting sensitive data from leaks, Network Management uses SNMP traps mainly for network device management, and Intrusion Detection Systems monitor network traffic to identify potential malicious activity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main functions of a Security Information and Event Management (SIEM) system?
How does a SIEM system differ from an Intrusion Detection System (IDS)?
What types of data can a SIEM system aggregate for analysis?
An administrator is reviewing the organization's disaster recovery plan and wants to confirm that critical files can be brought back online after a ransomware attack. Which of the following activities BEST demonstrates that the backup strategy will enable a full recovery?
Encrypting the backup archives with AES-256.
Performing a periodic restoration test in a nonproduction environment.
Storing backup tapes in an offsite, climate-controlled vault.
Scheduling differential backups to run every hour.
Answer Description
Periodically restoring data from backup media in a test (or otherwise nonproduction) environment proves that the data can actually be recovered and that the organization's procedures meet recovery-time and recovery-point objectives. Encrypting archives, storing tapes off-site, and scheduling differential backups all improve aspects of confidentiality, availability, or frequency, but none of them confirms that the data can be restored successfully.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to test backup restorations?
What types of loss events should backups be prepared for?
What are some common methods for testing backup restorations?
A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?
Masking
Geolocation
Tokenization
Encryption
Answer Description
Tokenization is the best answer because it substitutes the sensitive data with non-sensitive equivalents, known as tokens, which have no exploitable value. This allows the company to process transactions without exposing actual credit card data, significantly reducing the risk of breaches while still enabling business functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is tokenization and how does it work?
How does tokenization differ from encryption?
Why isn't encryption considered the best option for reducing credit card data breach risks?
A company is assessing various options to enhance the security of their facility and data center. Which of the following would serve as the best deterrent control to discourage trespassers from entering the secured premises of the data center?
Implementing badge readers at all points of entrance and exit
Installing highly visible security cameras around the perimeter and entry points
Erecting security awareness posters regarding tailgating in employee areas
Deploying mantraps at the primary entrance to the data center
Answer Description
Security cameras are a form of deterrent control designed to discourage unauthorized individuals from attempting to access a secure area. Their presence is often enough to dissuade potential attackers as it increases the likelihood of being caught and recorded, which can lead to identification and potential prosecution. In contrast, badge readers and mantraps, while part of physical security measures, are types of preventive controls that actively prevent unauthorized access. Security awareness posters do not directly discourage trespassers from entering secured premises, as they are more focused on educating authorized personnel on maintaining security practices.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are deterrent controls in security?
How do security cameras help in deterring crime?
What is the difference between deterrent controls and preventive controls?
When implementing changes to a system, which component ensures that if the change fails, the system can be restored to its previous state?
Backout Plan
Change Approval
Impact Analysis
Maintenance Window
Answer Description
A backout plan is essential in change management as it provides a predefined process to reverse changes and restore the system to its previous stable state if the new changes cause issues. This minimizes downtime and helps maintain system integrity. Other options, such as impact analysis, maintenance window, and change approval, are important but serve different purposes: impact analysis evaluates potential effects of the change; a maintenance window is the scheduled time for changes; and change approval is the authorization to proceed with changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a backout plan and how is it created?
What is the importance of an impact analysis in change management?
How does a maintenance window fit into the change management process?
Which type of threat actor is typically characterized by having significant resources, potentially governmental backing, and engages in cyber activities for reasons such as espionage or to gain strategic advantages?
Hacktivist
Nation-state
Insider threat
Unskilled attacker
Answer Description
A nation-state actor is often well-funded and supported by a government, engaging in cyber activities for purposes that include espionage, data exfiltration, or disruption for strategic advantage. This makes them a distinct and highly sophisticated threat. In contrast, an unskilled attacker does not have the same level of resources or complexity, hacktivists are primarily motivated by ideology, and insiders exist within the organization and may have personal motivations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of nation-state actors in cybersecurity?
How do nation-state actors differ from other types of threat actors?
What methods do nation-state actors commonly use in their cyber operations?
A network administrator needs to devise a strategy to optimize resource utilization when web-traffic spikes unpredictably, while also avoiding a single point of failure in the web-service infrastructure. Which configuration best meets these business requirements?
Create a server cluster for redundancy
Introduce a load balancer to distribute the traffic
Deploy a reverse proxy to manage web requests
Implement RAID configurations for all web servers
Answer Description
Placing a load balancer in front of a pool of identical web servers distributes each client request according to algorithms such as round-robin or least-connections. This evens out utilization, prevents any one server from being overwhelmed during traffic spikes, and automatically stops sending traffic to a failed node, eliminating that node as a single point of failure.
Clustering technologies focus on node redundancy and failover; in common active-passive clusters only one node actively serves traffic at a time, so they do not automatically spread day-to-day load. A reverse proxy can perform security, caching, and-depending on the product-may include load-balancing features, but the term alone does not guarantee request distribution. RAID protects disk storage and has no effect on HTTP traffic flow.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does a load balancer do?
What are the key differences between a load balancer and a reverse proxy?
Why is redundancy important in web service infrastructure?
A security administrator is deploying a firewall solution specifically to protect a public-facing web server from attacks like SQL injection and cross-site scripting (XSS). At which layer of the OSI model does this type of specialized firewall primarily operate?
Layer 3 (Network)
Layer 4 (Transport)
Layer 2 (Data Link)
Layer 7 (Application)
Answer Description
A Web Application Firewall (WAF) is designed to protect web applications from application-layer attacks such as SQL injection and cross-site scripting (XSS). It operates at Layer 7 (the Application layer) of the OSI model, where it can inspect the content of HTTP and HTTPS traffic. Traditional network firewalls operate at Layer 3 (Network) and Layer 4 (Transport), filtering traffic based on IP addresses and ports, and cannot inspect the application-specific data needed to stop these attacks. Layer 2 is the Data Link layer, which handles node-to-node data transfer using MAC addresses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model?
What functions do traditional firewalls perform?
What types of attacks do Web Application Firewalls protect against?
Which concept refers to designing a system capable of handling increased demand by adding resources?
Availability
Redundancy
Scalability
Resilience
Answer Description
Scalability is the ability of a system to handle a growing amount of work by adding resources. It ensures that as demand increases, the system can scale up or out to maintain performance levels. Resilience refers to a system's ability to recover from failures, availability is about the system being accessible when needed, and redundancy involves duplicating components to prevent failure but does not directly address increasing demand.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of how scalability can be achieved in a system?
How does scalability differ from availability in a system?
What is the significance of redundancy in relation to scalability?
A company's primary data center located in a hurricane-prone area has just experienced a significant storm, leading to a sustained power outage and compromised physical infrastructure. The company relies on a combination of on-site back-ups and replication to an off-site data center for their disaster recovery strategy. Given these details, which of the following would BEST ensure the continuation of business operations during this event?
Restoring operations from onsite backups as soon as connectivity is re-established.
Waiting until the primary data center is restored to resume critical business operations.
Implementing incremental backups until the primary data center is restored and operational.
Activating the business continuity plan which includes failing over to the off-site data center.
Answer Description
The correct answer is 'Activating the business continuity plan which includes failing over to the off-site data center.' This is because a well-prepared business continuity plan accounts for geographical risks such as natural disasters, and the existence of an off-site data center implies that the company has planned for replication and failover processes which can be activated when the primary site is non-operational. In contrast, relying solely on onsite backups will not suffice because the compromised infrastructure and ongoing power outage hinder the company's ability to restore systems locally. Incremental backups without replication would not address the immediate need to maintain operations since the data and systems are still within the affected area. Similarly, awaiting the restoration of the primary data center is not a viable strategy as it does not address the need for immediate business continuity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a business continuity plan?
Why is failing over to an off-site data center important during a disaster?
What does data replication mean in disaster recovery?
What type of network is especially vulnerable to eavesdropping due to its broadcast nature, making it essential to encrypt sensitive data?
Near Field Communication (NFC)
Bluetooth
Wired
Wireless
Answer Description
Wireless networks are particularly susceptible to eavesdropping because the data is transmitted over radio waves, which can be intercepted by unauthorized individuals if the network is not secured. Encryption ensures that even if data is intercepted, it cannot be understood without the correct decryption key. Wired networks, while they can also be vulnerable to other forms of interception, do not broadcast data through the air and therefore are generally not susceptible to eavesdropping in the same way as wireless networks. Bluetooth networks also use radio waves but on a more limited range and are typically used for connecting devices over short distances, while NFC is used for very short range communication such as contactless payments.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common encryption methods used to secure wireless networks?
How does eavesdropping on a wireless network occur?
What are the risks associated with using unsecured public Wi-Fi networks?
A security administrator needs to ensure that proprietary data remains confidential while remote employees access it from off-site locations over the internet. Which of the following is the BEST solution to protect this data in transit?
Install a web application firewall (WAF) in front of the corporate web servers.
Require multi-factor authentication (MFA) for all user accounts.
Enable Transport Layer Security (TLS) on all public-facing web services.
Implement a Virtual Private Network (VPN) for remote access.
Answer Description
A Virtual Private Network (VPN) is the best solution as it creates an encrypted tunnel across the public internet, securing all data in transit between the remote employee and the corporate network. This ensures confidentiality and integrity regardless of the application being used. While enabling Transport Layer Security (TLS) on web services is important, it only protects web traffic (HTTP), not other protocols employees might use. Requiring multi-factor authentication (MFA) strengthens user authentication but does not encrypt the data after access is granted. A web application firewall (WAF) is designed to protect web applications from attacks like SQL injection and cross-site scripting, not to provide general-purpose encryption for data in transit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a secure tunnel in the context of data transmission?
What encryption protocols are typically used to secure remote connections?
Why is encryption necessary for data in transit, especially for remote workers?
An IT security analyst at a financial institution has been tasked to inspect a suspected compromised workstation after several employees reported unusual activity. The analyst needs to verify if a keylogger software is installed on the system. Which of the following actions is MOST effective in determining the presence of keylogging software on the workstation?
Review the list of running processes and installed programs on the system.
Examine outbound network traffic for transmission of sensitive data to unauthorized destinations.
Ensure that the operating system and security software are up to date with the latest patches.
Check for unusual file permissions on critical system files and directories.
Answer Description
Reviewing the list of running processes and installed programs on the system can help in identifying any unauthorized software, including keylogging applications, which may not be immediately visible to the end user. This method is effective in finding both known keyloggers and suspicious software that could potentially be keyloggers. Examining network traffic may not reveal keyloggers specifically, as they might only log keystrokes without sending them out immediately. Checking for unusual file permissions may indicate a security concern but does not directly pertain to identifying keylogging software. Ensuring operating system updates are current is a good security practice but on its own does not aid in detecting a keylogger already present on a workstation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a keylogger and how does it work?
What are the signs of a compromised workstation?
Why is reviewing the list of running processes important in cybersecurity?
Which of the following is the BEST method for an organization to proactively engage with the security community and offer a structured means of reporting vulnerabilities identified within its systems or applications?
Develop an incident response team
Establish a responsible disclosure program
Implement a formal change management procedure
Regularly perform penetration tests
Answer Description
A responsible disclosure program is a structured approach that provides clear guidelines for external parties to report vulnerabilities. It typically includes timelines for the organization to respond and resolve the reported vulnerabilities, while also ensuring that the researchers refrain from public disclosure until the issue has been remediated. Bug bounty programs are a type of responsible disclosure program where security researchers are financially rewarded for discovering and responsibly disclosing software bugs. While pen tests are an internal method to uncover vulnerabilities, they do not involve the external security community reporting issues. Incident response teams handle security incidents not vulnerability disclosure, and change management pertains to procedures for systematic handling of all changes to a system and is unrelated to the external reporting of security vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components of a responsible disclosure program?
How does a bug bounty program fit into a responsible disclosure program?
Why are penetration tests and incident response teams not sufficient for vulnerability reporting?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.