CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
An organization is considering updating their wide area network architecture to improve the management of security policies and the application of security updates across the network. What is the PRIMARY security benefit of transitioning to a Software-Defined Wide Area Network?
Optimized performance through application-aware routing
Centralized management of security policies and updates
Dynamic path selection for bandwidth optimization
Reduction in operational costs by utilizing virtualization
Answer Description
A Software-Defined Wide Area Network (SD-WAN) provides centralized management, enabling organizations to apply security policies and updates uniformly across the network with ease. This centralized approach not only simplifies the administration of the network but also ensures consistent security measures are in place throughout, addressing the organization's need for improved security management. While the option of improved performance through optimized routing is a benefit of SD-WAN, it is not inherently a security benefit. Reduction in operational costs mainly pertains to financial aspects rather than direct security enhancements. Similarly, the ability to dynamically change network paths is a performance-related benefit, but it's not the primary security advantage that SD-WAN offers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Software-Defined Wide Area Network (SD-WAN)?
What are some key components or features of SD-WAN?
How does centralized management improve security in SD-WAN?
A multinational corporation with operations in several countries is working to ensure compliance with global data protection regulations. What is the most appropriate action for the company to take in order to maintain compliance with the diverse set of regulations concerning user data privacy?
Delegate the responsibility for compliance with data protection laws to the IT department of each local office.
Create a data retention policy that focuses on adhering to the least restrictive data protection standards to ensure ease of data flow.
Establish a data governance framework that complies with the highest standard among the international data protection regulations.
Set up an external compliance team dedicated to each region to handle region-specific data privacy laws.
Answer Description
Establishing a comprehensive data governance framework that is built to comply with the highest standard among international data protection regulations ensures that the organization operates above the baseline requirements of all jurisdictions it operates in. This approach is usually more efficient than attempting to comply with each set of local regulations separately and minimizes the risk of non-compliance. Marking the setup of an external compliance team as the correct answer would be inappropriate because it does not necessarily ensure compliance with global data protection standards. Creating a data retention policy focusing on the least restrictive standards does not ensure compliance with more stringent regulations in other jurisdictions. Lastly, leaving the compliance decision to local IT departments may result in a fragmented and inconsistent approach to data protection that could lead to non-compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a data governance framework?
What are international data protection regulations?
Why is compliance with the highest standard beneficial?
During an audit as a third party security consultant you are told that the organization being audited conducts an exercise annually during which prominent IT staff and the security team gather in a meeting room and discuss how they would handle various security incidents and disaster scenarios. This exercise is then used to update any policies and playbooks. What type of exercise are they describing?
Business Impact Exercise (BIE)
Dungeons and Dragons (DND)
Tabletop Exercise
Incident Response Planning (IRP)
DR Planning
Answer Description
In a tabletop exercise the key staff of an organization gather and discuss their actions during an incident (security incident, disaster, etc.). The staff is sometimes organized into blue and red teams (attackers and defenders). The exercise is used to train staff, promote collaboration and identify any weak spots in existing procedures and plans.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a tabletop exercise?
What are blue and red teams?
Why are tabletop exercises important for organizations?
A security manager is trying to calculate the expected monetary loss from data breach incidents that historically happen twice each fiscal year. If the average cost for each data incident is estimated to be $50,000, what is the BEST estimate for the yearly financial impact of these breaches?
The yearly financial impact is estimated to be $200,000.
The yearly financial impact is estimated to be $50,000.
The yearly financial impact is estimated to be $25,000.
The yearly financial impact is estimated to be $100,000.
Answer Description
To estimate the yearly financial impact of the security breaches, the security manager needs to consider both the frequency of the incidents and the cost of each incident. This is known as Annualized Loss Expectancy, which is the product of the yearly occurrence rate and the cost of a single incident. Since the data breaches happen twice per year, the frequency (occurrence rate) is 2. Multiplying this by the cost for a single data breach ($50,000) gives an estimated annual impact of 2 * $50,000 = $100,000. Similarly named metrics or partially correct values would not account for both the incidence frequency and individual incident cost correctly.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Annualized Loss Expectancy (ALE)?
Why is it important to calculate the expected monetary loss from data breaches?
How often do data breaches typically occur in organizations?
What technique enhances the security of a password by adding random data to it before it's hashed?
Tokenization
Hashing
Key Stretching
Salting
Answer Description
Salting involves adding random data, known as a 'salt', to an input before hashing it. This process prevents against identical inputs producing the same hash (reducing the risks from rainbow table attacks) and improves password security by ensuring that even identical user passwords will result in different hashes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is salting in the context of password security?
How does salting help protect against rainbow table attacks?
What are other techniques besides salting that improve password security?
Your organization wants to test its cybersecurity defenses. A penetration test is conducted without making those responsible for defense aware of the test. This type of test is done by which of type of team?
Red
Blue
White
Purple
Answer Description
A penetration test conducted by a Red team is done without the knowledge of the team in charge of defending against intrusions. This allows for the testing of defenses in a more real world like scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly does a Red team do in cybersecurity?
What is the difference between Red teams and Blue teams?
What are some common methods used in Red team penetration tests?
Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?
Publishing a quarterly newsletter highlighting social engineering threats
Including a quiz at the end of the training session
Unannounced network scans after training completion
Conducting unannounced phishing simulation campaigns
Answer Description
Phishing simulations are a practical method of testing employees' abilities to recognize and respond to social engineering attacks. This type of simulation provides actionable insights by creating realistic scenarios similar to actual phishing attempts, without the associated risk. This helps measure the effectiveness of the training and identifies areas where additional training may be necessary. Answer options like 'Unannounced network scans' and 'Publishing quarterly newsletters' are less direct and less effective methods of assessing the specific understanding of recognizing social engineering attacks. Although helpful in a broader security context, they do not directly test the application of the training content. 'Including a quiz at the end of the training session' can validate immediate retention but does not measure long-term understanding or practical application in an actual work environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are phishing simulations, and how do they work?
Why are unannounced phishing attacks more effective than quizzes?
What other methods can companies use to reinforce training on social engineering attacks?
A new company policy requires hardware encryption for certain highly confidential systems. These existing systems do not already have a hardware component that can provide this functionality. What is the easiest way to implement this new policy?
Hardware Security Module
RADIUS
Trusted Platform Module
PKI
Answer Description
For existing systems the best option to add additional hardware based encryption functionalities is using a Hardware Security Module (HSM). HSM's are usually stand alone devices that can be used by other systems or expansion cards that can be added. Trusted Platform Module could provide similar functionalities but are permanently embedded into a system, so to use a TPM the systems falling under this new policy would need to be replaced with new hardware that has a TPM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a Hardware Security Module (HSM)?
How does a Trusted Platform Module (TPM) differ from an HSM?
What are the key benefits of using hardware encryption in systems?
A company's competitor has been found to be spreading false information about the company's financial stability, intending to manipulate stock prices and discredit the company in the eyes of investors and customers. This deliberate spread of misleading content is intended to cause harm to the company. What type of activity does this scenario best exemplify?
Hacking
Disinformation
Phishing
Whaling
Answer Description
This scenario is a classic example of disinformation, which is the deliberate creation and distribution of false or misleading information with the intent to deceive and mislead audiences. The objective is often to influence public opinion or obscure the truth. Disinformation is different from misinformation, which is the sharing of false information without the intent to deceive, often due to a lack of knowledge or understanding. Other options like 'Phishing' and 'Hacking' involve direct technical attacks or deception to extract sensitive information, which is not the case here, and 'Whaling' is a specific type of directed phishing targeting high-profile individuals.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common tactics used in disinformation campaigns?
What are the potential consequences of disinformation for a company?
How does disinformation differ from misinformation?
A company is preparing to roll out a major update to one of its critical applications. The update includes new features and security patches. Prior to deployment, the security team wants to ensure that they can quickly revert to the previous stable version in case of unexpected problems with the new release. Which method would BEST ensure that they can manage and control application versions effectively?
Update the disaster recovery plan to include steps for reverting application updates.
Deploy an automated patch management tool to handle version updates.
Implement a version control system to manage application updates and rollbacks.
Create regular manual backups of the application's installation directory.
Answer Description
Using a version control system is the best method for managing and controlling application versions as it allows teams to track changes, revert to previous versions, and maintain a history of modifications. This system enables quick reversion to a known good state in case the new update causes issues. Manual backups could also allow reversion but lack the history tracking and might not be as current. An automated patch management tool is more for ensuring systems are up-to-date and is not designed primarily for version tracking or quick reversion. The disaster recovery plan focuses on recovering from catastrophic events and is not typically used for routine version management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system?
What are the benefits of using version control for application updates?
How does version control differ from manual backups?
Your organization is looking to enhance its disaster recovery capabilities to ensure business continuity after an unexpected event. Which type of site provides an on-demand, operational environment that can be quickly made ready to resume critical business functions with all of the necessary hardware and software?
Cold site
Warm site
Mobile site
Hot site
Answer Description
A hot site is a fully operational offsite data center equipped with hardware and software, configured to quickly assume operational responsibilities from a primary site in case of a disaster. This is the best option for business continuity as it enables rapid resumption of critical functions. A cold site, while being the least expensive, offers only space and utilities, requiring additional time to become operational. A warm site provides some pre-installed equipment but would still require additional time and effort to be fully operational. Therefore, a hot site offers the highest level of readiness for immediate disaster recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly makes a hot site different from a warm site?
What are the typical costs associated with maintaining a hot site?
Could you explain what a mobile site is and when it might be used?
A company's proprietary application is critical for daily operations, but it runs on an operating system that no longer receives vendor updates. The company's IT team is currently unable to upgrade the system or migrate the application due to compatibility issues. What is the most effective risk mitigation strategy the IT team should implement to secure the legacy system against potential threats?
Increase security monitoring specifically targeting the unsupported system to detect anomalies
Implement network segmentation and restrict the system's network connectivity to essential services
Conduct regular security audits on the system to ensure compliance with security policies
Encourage users to employ stronger passwords for system access
Answer Description
Implementing network segmentation and limiting the legacy system's connectivity to essential services is the correct answer. This approach reduces the risk of attacks from both internal and external threat vectors, as it would prevent the potentially compromised system from affecting unrelated parts of the network. While increasing security monitoring is a useful tactic, it does not directly mitigate the exposure of the legacy system to threats. Conducting regular security audits on the system is a good practice, but it does not provide real-time protection against threats. Encouraging the use of strong passwords is important but does not address the specific risks associated with an unsupported operating system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation, and why is it important for securing legacy systems?
What are essential services, and how do you determine what they are for a legacy system?
What are some potential risks associated with using an unsupported operating system?
Which security control should a bring-your-own-device (BYOD) policy require on all personally owned smartphones and laptops that access or store company data in order to mitigate the risk of data exposure if the device is lost or stolen?
Disable near-field communication (NFC) on the device
Enforce geofencing so the device works only on-site
Set the screen-lock timeout to 30 minutes
Require full-disk (device) encryption
Answer Description
Full-disk (device) encryption protects data at rest by rendering the entire storage medium unreadable without proper authentication. If a device is lost or stolen, attackers cannot access corporate information without the decryption key. Disabling NFC, restricting device use to a geographic area, or lengthening the screen-lock timeout do not provide the same level of protection for locally stored data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is disk encryption and how does it work?
Why is disk encryption especially important in a BYOD (Bring Your Own Device) policy?
What are the risks of not implementing disk encryption in an organization?
An organization wants to discourage potential intruders by signaling that security measures are in place. By installing visible security cameras and posting warning signs around their premises, which type of control are they implementing?
Preventive Control
Detective Control
Deterrent Control
Corrective Control
Answer Description
The organization is implementing deterrent controls, which are designed to discourage potential attackers by making them aware of the security measures in place. Visible security cameras and warning signs serve as psychological deterrents, reducing the likelihood of an attack. Preventive controls aim to stop incidents from occurring by blocking unauthorized actions, such as through access controls or firewalls. Detective controls identify and alert to incidents after they have occurred, like intrusion detection systems. Corrective controls focus on limiting damage after an incident, such as restoring systems from backups.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly are deterrent controls?
How do deterrent controls differ from preventive controls?
Can you give me examples of detective and corrective controls?
A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?
Mean Time to Repair (MTTR)
Recovery Time Objective (RTO)
Reconnaissance
Annualized Loss Expectancy (ALE)
Answer Description
The Recovery Time Objective (RTO) specifies the target amount of time a service provider aims to restore a business process after a disruption and is therefore the primary focus when ensuring timely restoration of services as per the service-level agreement (SLA). Mean Time to Repair (MTTR) refers to the average time to repair a broken component, which, although important, is not specific to service-level targets for business processes. Annualized Loss Expectancy (ALE) is used in risk assessment and financial impact analysis, not in SLAs. Reconnaissance is related to information gathering, typical in security assessments like penetration testing, and is unrelated to SLAs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does Recovery Time Objective (RTO) mean?
How is RTO different from Mean Time to Repair (MTTR)?
What is a Service-Level Agreement (SLA) and why is it important?
A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?
A misconfigured automatic task on the server
Execution of client-side scripts from a user's web browser
Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities
A user navigating the company's public website pages
Answer Description
The pattern described suggests a reconnaissance action, possibly an attacker performing a directory traversal to uncover hidden files, directories, or exploit potential vulnerabilities. Normal browsing behavior usually involves fewer requests and focuses on typical, user-facing paths. Client-side scripting refers to scripts running in a user's browser, generally not visible on server logs. A misconfigured scheduled task might repeatedly access the same path, not different uncommon ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is reconnaissance in the context of cybersecurity?
What is directory traversal and why is it a concern?
How can organizations detect and mitigate reconnaissance activities?
You are the IT manager overseeing a security assessment project. To ensure the third-party security firm's penetration test activities align with company policies and legal requirements, which document must be established to detail the testing boundaries, methods, timelines, and communication protocols?
Acceptable Use Policy (AUP)
Master Service Agreement (MSA)
Rules of Engagement (ROE)
Interconnection Security Agreement (ISA)
Answer Description
The Rules of Engagement (ROE) document is essential for outlining the specific parameters of how a penetration test will be carried out, including the testing scope, methods, timelines, communication protocols, and restrictions. It sets the stage for both legal protection and confirming that the security firm operates within the agreed limits. The Acceptable Use Policy is related to the proper usage of company resources by employees and does not guide the conduct of a security firm during a penetration test. An Interconnection Security Agreement dictates the requirements for connecting systems and data sharing but is not specific to the conduct of a penetration test.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific information should be included in the Rules of Engagement (ROE)?
How does an ROE protect both the company and the third-party firm?
What other documents might be relevant alongside the ROE during a penetration test?
What can an organization implement when a vulnerability cannot be patched immediately, to mitigate the risk while maintaining business functionality?
Encryption
Penetration testing
Compensating controls
Threat intelligence
Answer Description
Compensating controls are security measures that are put in place to mitigate the risk associated with identified vulnerabilities that cannot be immediately resolved. They serve as alternatives to the direct remediation of security weaknesses, often due to technical, business, or financial constraints. Implementing compensating controls allows an organization to continue operations securely by reducing the potential impact of the vulnerability until it can be properly addressed. Encryption is not inherently a compensating control but might be part of one, depending upon the context. Threat intelligence and Penetration testing are methods for identifying vulnerabilities, not compensating for them.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are examples of compensating controls?
How do compensating controls differ from regular security measures?
Why might an organization choose to use compensating controls instead of waiting for a patch?
Which of the following scenarios best describes an attack that is likely to cause abnormal consumption of system resources, potentially leading to a system outage?
DDoS attack
Email spam campaign distributing unsolicited messages
Phishing attack that deceives a user into sharing their password
Social engineering attack that tricks an employee into wiring money
Answer Description
A Distributed Denial-of-Service (DDoS) attack is a cyber-attack in which multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers, causing a drastic spike in resource consumption. This can overwhelm the system, leading to slowdowns or complete denial of service. In contrast, phishing and social engineering attacks primarily focus on deception to gain information, and they do not typically result in excessive resource consumption. Email spam may consume resources, but it is typically not as impactful as a coordinated DDoS attack that targets and exhausts system resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a DDoS attack? How does it work?
What are the potential consequences of a successful DDoS attack?
How can organizations protect themselves from DDoS attacks?
In a move to 2FA, Crucial Technologies has begun to require employees to log in using their username and password and an additional password that is generated by an authenticator and is valid for only a limited period. This is what type of authentication technology?
SMS
Static codes
HOTP
TOTP
Answer Description
A time-based one-time password (TOTP) is an auto-generated, one-time password used in two-factor authentication. The password is for a single use and is valid for only a limited amount of time. This differs from an HMAC-based one-time password (HOTP), where passwords are valid until they are used.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does TOTP stand for and how does it work?
What is the difference between TOTP and HOTP?
Why is 2FA important in cybersecurity?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.