CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
An organization is expanding its onsite data center infrastructure to accommodate a recent growth in remote workforce. They are concerned with the creation of a secure network architecture. In this scenario, which of the following would be the BEST solution to ensure secure remote access while minimizing the attack surface?
Deploy an intrusion detection system at the network perimeter.
Install a virtual private network (VPN) for secure remote connections.
Use a jump server as the sole access point for network management.
Configure a proxy server to control and filter outbound internet traffic.
Answer Description
Implementing a VPN would provide encrypted connections from remote locations to the data center, allowing for secure communication while limiting exposure to attacks. A proxy server primarily acts as an intermediary for users seeking resources from other servers and might not provide the necessary encryption for all communications. Intrusion detection systems (IDS) are crucial for monitoring and detecting potential threats but do not directly provide secure access for remote users. While a jump server can provide a controlled entry point into a network, it's not as comprehensive for remote access security as a VPN, which also encrypts the data in transit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VPN and how does it work?
What does minimizing the attack surface mean?
What role does encryption play in remote access security?
What is the primary goal of conducting a tabletop exercise as part of cybersecurity testing?
To conduct an automated penetration test against the organization's IT infrastructure.
To physically test the security measures in place by attempting to gain unauthorized access to a facility.
To facilitate a scenario-driven discussion that tests an organization's incident response plan.
To perform a live-action simulation of a cyberattack on the organization's network.
Answer Description
The primary goal of a tabletop exercise is to verify the effectiveness of an organization's incident response plan through a facilitated discussion on how to address and manage hypothetical security incidents. This non-technical assessment focuses on communication, coordination, and decision-making processes, distinguishing it from other forms of response drills that involve active technical engagement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are tabletop exercises in cybersecurity?
How does a tabletop exercise differ from a live-action simulation?
What should be included in an organization's incident response plan?
A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?
A misconfigured automatic task on the server
A user navigating the company's public website pages
Execution of client-side scripts from a user's web browser
Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities
Answer Description
The pattern described suggests a reconnaissance action, possibly an attacker performing a directory traversal to uncover hidden files, directories, or exploit potential vulnerabilities. Normal browsing behavior usually involves fewer requests and focuses on typical, user-facing paths. Client-side scripting refers to scripts running in a user's browser, generally not visible on server logs. A misconfigured scheduled task might repeatedly access the same path, not different uncommon ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is reconnaissance in the context of cybersecurity?
What is directory traversal and why is it a concern?
How can organizations detect and mitigate reconnaissance activities?
A company's IT department is implementing a new web application that will store sensitive customer information. As part of the design, they need to ensure appropriate user access to data within the application. Which of the following methods is MOST effective in restricting access to the data based on a user's role within the company?
Using MAC to assign classification labels to data
Requiring username and password authentication for application logins
RBAC
Allowing DAC where users control access to their data
Answer Description
Role-based access control (RBAC) is effective for restricting access to data within an application based on a user's role within an organization. RBAC policies ensure that only authorized users are granted the permissions necessary to access, modify, or interact with sensitive data, thus maintaining the principle of least privilege. It simplifies management and helps in effectively enforcing enterprise security policies.
While mandatory access control (MAC) and discretionary access control (DAC) are valid access control models, MAC is more commonly used in environments requiring high security and enforces access based on classified levels, which may be overly complex for a web application in a business setting. DAC, on the other hand, is based on the discretion of the owner, which could lead to a lack of consistent policy enforcement.
Username and password authentication, although necessary for verifying identity, does not inherently restrict actions based on user roles, hence it would not be effective on its own in this scenario for controlling permissions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles behind Role-Based Access Control (RBAC)?
How does RBAC differ from Discretionary Access Control (DAC)?
Why is role assignment important in an RBAC system?
A company wants to minimize the exposure of sensitive customer credit card data within its e-commerce environment. Which of the following data protection strategies would BEST reduce the risk of credit card data breaches while maintaining the ability to perform transactional operations?
Geolocation
Masking
Encryption
Tokenization
Answer Description
Tokenization is the best answer because it substitutes the sensitive data with non-sensitive equivalents, known as tokens, which have no exploitable value. This allows the company to process transactions without exposing actual credit card data, significantly reducing the risk of breaches while still enabling business functionality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is tokenization and how does it work?
How does tokenization differ from encryption?
Why isn't encryption considered the best option for reducing credit card data breach risks?
A company is migrating its database containing sensitive customer information to a public cloud using an Infrastructure as a Service (IaaS) model. According to the typical cloud shared responsibility model, which party is primarily responsible for ensuring the sensitive data within the database is encrypted?
The customer is responsible for configuring encryption for their data.
The responsibility is equally shared, with both parties co-managing the encryption keys.
The cloud provider is responsible for encrypting all customer data by default.
A third-party auditor is responsible for implementing encryption controls.
Answer Description
This statement is correct. In the cloud shared responsibility model, particularly for IaaS, the customer retains responsibility for securing their own data. This includes classifying the data, deciding what to encrypt, and managing the encryption configurations and keys. While the cloud provider is responsible for the security of the cloud (the physical infrastructure), the customer is responsible for security in the cloud, which encompasses their data, applications, and guest operating systems. The provider offers encryption tools, but the customer must choose to implement and manage them for their data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the 'responsibility matrix' in cloud computing mean?
How can customers manage encryption keys in the cloud?
Why is encryption important for sensitive data in the cloud?
What is the primary role of monitoring in relation to indicators within a security infrastructure?
Conducting retrospective analysis to determine the root cause of a security incident
Remediating vulnerabilities to prevent the exploitation of a system
Identifying unusual patterns or behavior that may signify a security incident
Enforcing policy by shutting down systems that do not adhere to predefined configurations
Answer Description
The primary role of monitoring in relation to indicators within a security infrastructure is to identify unusual patterns or behavior that may signify a security incident. While it might also help in enforcing policy by triggering alerts when anomalies are detected, and can be instrumental in retrospective analysis after an incident, its essential function centers on the prompt detection of potentially malicious activity. Understanding the nuances of monitoring's main role is important in distinguishing it from ancillary benefits such as policy enforcement or post-incident analysis.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are indicators in a security context?
How do security teams monitor for unusual patterns?
What is the difference between monitoring and retrospective analysis?
According to industry guidance such as NIST SP 800-88, which high-level action should an organization take to ensure that data on any storage device (including HDDs and SSDs) is rendered unrecoverable before the device is disposed of or leaves organizational control?
Delete all visible files and empty the recycle bin
Disable the storage controller in the system BIOS
Sanitize the media before disposal
Run a quick format on the device
Answer Description
Media sanitization is defined by NIST SP 800-88 as a process that makes access to the data infeasible. Sanitization can be accomplished by methods such as overwriting, cryptographic erase, degaussing (for magnetic media), or physical destruction, depending on the device. Simply formatting, deleting files, or disabling hardware does not guarantee that residual data cannot be recovered.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different methods of data sanitization?
Why is data sanitization necessary before disposing of a hard drive?
What is the difference between data sanitization and data deletion?
An organization has decided to implement an application allow list policy to reduce the risk of malware infections on its network. Which of the following best describes the action the organization is taking?
Compiling a list of software that users believe should not be installed on their systems.
Creating a list of authorized software that is allowed to run on company systems.
Allowing users to decide which software can be executed on their individual workstations.
Permitting all installed software to run but monitoring their behaviors for any suspicious activity.
Answer Description
Implementing an application allow list involves creating a list of approved software that is permitted to run on company systems, effectively preventing any non-approved software from executing. This method enhances security by ensuring that only trusted applications are allowed to operate, thus minimizing the likelihood of malicious software running on the network. Options suggesting users decide on the software or only listing unapproved software do not conform to the concept of an application allow list. Allowing any installed software to run would defeat the security benefits of an allow list.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an application allow list and how does it work?
How does an application allow list help in preventing malware infections?
What are the differences between an allow list and a block list?
A cybercriminal gains access to sensitive internal documents revealing a company's illegal activities and threatens to release them unless the company complies with their demands. What is the attacker's primary motivation in this scenario?
Revenge
Espionage
Blackmail
Sabotage
Answer Description
Blackmail involves threatening to reveal sensitive or damaging information unless specific demands are met. In this scenario, the attacker is leveraging confidential documents to coerce the company. Espionage involves gathering information for intelligence purposes, typically for a foreign entity. Revenge is motivated by a desire to retaliate for a perceived wrong, and sabotage aims to deliberately destroy or damage assets. Therefore, blackmail is the primary motivation described.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is blackmail and how does it work?
What distinguishes blackmail from other cyber threats like espionage?
Can you explain the potential legal consequences of blackmail?
A company's security team has recently upgraded the network firewall to a newer model to enhance security features. As a security analyst, what is the MOST important action to perform following the upgrade to ensure ongoing operational efficiency?
Schedule a meeting with the stakeholders to discuss the possibility of future upgrades.
Implement additional firewall rules to immediately increase the security posture without a scheduled review.
Update the security policies and network configuration documentation to reflect changes made by the new firewall.
Perform a complete network penetration test to identify potential new vulnerabilities introduced.
Answer Description
The documentation should be updated whenever changes are made to the security infrastructure. This includes major upgrades such as the implementation of a new firewall. Updating the documentation ensures that accurate information is available for the operation and maintenance of the security controls, as well as for audit purposes. Failing to update documentation can lead to confusion, improper configuration, and weaknesses in security. The incorrect options, while they may be important in other contexts, do not directly address the primary need for keeping an accurate historical record of system configurations and policy changes that affect security operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to update security policies and network configuration documentation after a firewall upgrade?
What are some key aspects that should be included in updated network configuration documentation?
What could be the risks of not updating documentation after security changes?
Which of the following is used to guide the secure setup of systems and applications by providing a collection of security configuration settings?
Automated reports
Vulnerability scans
Security groups
Benchmarks
Answer Description
Benchmarks are collections of security configuration settings that provide guidance for the secure setup of systems and applications. They are often developed by communities of cybersecurity experts and provide a standard set of practices for ensuring that a technology is deployed securely.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of security benchmarks?
How are benchmarks created, and who is involved in the process?
Why are benchmarks important for cybersecurity?
To enhance incident detection, a company is configuring their monitoring system to manage the alarm process effectively. Which of the following options is the MOST effective method for ensuring that critical alarms are received and addressed immediately by the appropriate personnel?
Adjust the threshold for notification to reduce the volume of alarms triggered.
Implement an automated ticketing system where alarms trigger the creation of investigation tickets.
Send alarm notifications to mobile devices or a messaging app used by the cybersecurity team.
Instruct the team to conduct daily audit log reviews for security-related events.
Answer Description
The most effective method to ensure that critical alarms are not missed and are responded to promptly is to have them sent directly to a dedicated communication channel for the cybersecurity team. This could include push notifications on their phones or messaging apps specifically designated for immediate cybersecurity alerts. Adjusting the notification parameters to reduce noise would not be as effective without a direct line of communication. Scheduling daily reviews of logs could lead to delays in response time, which can be detrimental in case of an emergency response. Lastly, setting up an automated ticketing system adds unnecessary delay in a situation that may require an immediate reaction.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of dedicated communication channels can be used for receiving alarms?
Why is adjusting the threshold for notification considered less effective?
How can automated ticketing systems be useful in incident response?
A security analyst is tasked with enhancing the organization's proactive defense capabilities by identifying new and evolving attack methodologies before they are widely used. Which of the following would be the MOST effective practice for this purpose?
Conduct regular internal vulnerability scans on all network assets.
Perform a comprehensive penetration test on an annual basis.
Subscribe to and analyze threat intelligence feeds.
Enforce a more stringent password complexity and rotation policy.
Answer Description
The correct answer is to subscribe to and analyze threat intelligence feeds. Threat intelligence feeds provide up-to-date information on emerging threats, new attack vectors, malware, and adversary tactics, techniques, and procedures (TTPs). This allows security professionals to proactively adjust defenses against new threats. While the other options are valid security practices, they are not the most effective for identifying emerging threats. Regular vulnerability scanning is crucial for finding known vulnerabilities in the current environment but is reactive to what is already known. Enforcing stronger password policies is a fundamental security control but does not provide insight into new attack methods. Annual penetration testing validates existing defenses against known attack types but is a point-in-time assessment and less effective for continuous monitoring of new, evolving threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are emergent threats in IT security?
What is meant by adjusting a security posture?
How can organizations effectively monitor for threats?
A financial services company wants to ensure that its security controls are effectively protecting its network and critical data assets. The company is mandated by regulatory requirements to conduct periodic reviews of its security infrastructure. Which of the following would BEST satisfy the need for an unbiased evaluation of the operational security?
Scheduling regular penetration testing by the in-house cybersecurity team.
Contracting an independent third-party to perform a comprehensive audit of security controls.
Continuous monitoring by an internal audit committee.
Conducting a thorough self-assessment using internal security and audit teams.
Answer Description
An independent third-party audit provides an unbiased review of security controls and practices. It is frequently required by regulatory standards in sensitive industries, such as finance, to ensure controls are up to the required effectiveness because internal teams may have inherent biases or conflicts of interest. A self-assessment, while valuable, can be biased due to internal influence. Penetration testing is a proactive security measure but does not constitute an independent review of all operational security processes. Monitoring by an internal audit committee will not fulfill the requirement for an unbiased and independent evaluation as required by many regulatory frameworks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is an independent third-party audit preferred over a self-assessment?
What are some key components that an independent security audit should cover?
What regulations might require periodic independent audits for financial services companies?
Nice!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.