CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which physical threat involves natural disasters impacting organizational assets?
Environmental threat
Brute force attack
RFID cloning
Logic bomb
Answer Description
Environmental threats involve natural disasters like floods, earthquakes, and fires that can physically damage an organization's assets and infrastructure. Unlike human-driven attacks, these threats originate from environmental factors. Brute force attacks are attempts to guess credentials through trial and error, RFID cloning involves duplicating access badges, and logic bombs are malicious code triggered by specific conditions. Recognizing environmental threats is crucial for comprehensive security planning.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of environmental threats?
How can organizations prepare for environmental threats?
How do environmental threats differ from human-driven threats?
A company is hardening the connection between its public e-commerce website and the browsers of customers worldwide. The security team wants to ensure that any data exchanged is unreadable if intercepted, that the server's identity can be validated by the client, and that any unauthorized modification of packets is detected immediately. Which protocol BEST satisfies these goals?
Internet Protocol Security (IPsec)
Secure Shell (SSH)
Privacy Enhanced Mail (PEM) files
Transport Layer Security (TLS)
Answer Description
Transport Layer Security provides end-to-end encryption for applications such as HTTP, validates the server (and optionally the client) through X.509 certificates, and includes message authentication codes to detect tampering. SSH also offers encryption, but it is designed for interactive sessions and port forwarding rather than directly protecting web traffic. PEM is only a text encoding for keys and certificates, not a protocol. IPsec can secure network traffic but is most commonly deployed for site-to-site or remote-access VPN tunnels, not for protecting individual web sessions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Transport Layer Security (TLS) and how does it work?
What is an X.509 certificate, and why is it important in TLS?
How does TLS differ from other protocols like SSH and IPsec?
A digital forensics investigator is collecting evidence from a compromised workstation. Which action best maintains the chain of custody?
Use write-blocking devices to prevent data alteration.
Encrypt the evidence to protect it from unauthorized access.
Analyze the evidence on the original workstation to maintain context.
Record the date, time, and individuals who handle the evidence.
Answer Description
Recording the date, time, and individuals who handle the evidence ensures a documented trail, which is crucial for maintaining the chain of custody. This documentation verifies that the evidence has not been tampered with and is admissible in court. While other actions like using write-blocking devices are important for preserving evidence integrity, they do not directly address the documentation aspect of the chain of custody.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the chain of custody in digital forensics?
Why are write-blocking devices used in digital forensics, and how do they differ from maintaining the chain of custody?
What steps are involved in properly documenting evidence for the chain of custody?
A security analyst is investigating an incident where multiple users reported that when they tried to access their company's legitimate cloud-based storage portal, they were redirected to a fraudulent website that prompted them for their credentials. The users confirmed they had typed the correct URL into their browsers. Which of the following attacks MOST likely occurred?
Credential replay
Distributed denial-of-service (DDoS)
On-path attack
DNS cache poisoning
Answer Description
This scenario describes DNS cache poisoning, also known as DNS spoofing. In this attack, an attacker introduces incorrect DNS data into a DNS resolver's cache, causing the server to return a malicious IP address for a legitimate domain. When users attempt to access the legitimate site, they are redirected to the attacker's fraudulent site. A DDoS attack would make the service unavailable, not redirect it. An on-path attack could potentially intercept and redirect traffic, but DNS poisoning specifically targets the name resolution process itself. Credential replay involves an attacker maliciously reusing stolen credentials, which would be a potential outcome of this attack, not the cause of the redirection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DNS cache poisoning?
How is DNS cache poisoning different from an on-path attack?
How can organizations prevent DNS cache poisoning?
You are a super 1337 hacker who just discovered a vulnerability in an operating system. You do some research and find nothing online regarding this exploit and believe you are the first to find it. What option would be the correct classification of this vulnerability?
Zero day
North/South
East/West
Spoof
Brute force
Denial of Service
Answer Description
OBJ-1.6: A zero-day attack happens once that flaw, or software/hardware vulnerability, is exploited, and attackers release malware before a developer has an opportunity to create a patch to fix the vulnerability, hence the term zero-day.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a zero-day vulnerability?
How are zero-day vulnerabilities identified and addressed?
What makes zero-day vulnerabilities so dangerous?
You receive a robocall from a number that appears to be your bank. During the call you are told that there was suspicious activity on your account and to remain on the line to talk to an agent. An individual then got on the line and asked you questions that would allow someone to compromise your account. This is an example of which type of specific social engineering?
Smishing
Watering hole
Pretexting
Vishing
Answer Description
Vishing (or voice phishing) is phishing done using voice over the telephone. This type of phishing often involves the use of voice over IP technology to spoof the caller ID of a legitimate phone number.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between vishing and phishing?
How does VoIP spoofing work in vishing attacks?
What are some steps to protect yourself from vishing attacks?
Which of the following is an example of a technical control used to protect network resources?
Security awareness training
Access controls
Encryption
Firewall
Answer Description
A firewall is a technical control that acts as a barrier between trusted internal networks and untrusted external networks, such as the Internet. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls can prevent unauthorized access, block malicious traffic, and enforce network security policies.
Access controls and encryption are also examples of technical controls, but they are not as specific to network resource protection as a firewall. Security awareness training is a managerial control focused on educating users about security best practices and policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a firewall, and how does it work?
How do firewalls differ from access controls?
What is the difference between technical, managerial, and operational controls in cybersecurity?
A security consultant is helping an organization to enhance the detection capabilities of unauthorized activities within its internal network. The organization's security strategy includes the deployment of Network Intrusion Detection Systems (NIDS) but also emphasizes minimizing the impact on network performance. Which deployment strategy should the consultant recommend?
Deploy NIDS sensors in inline mode to actively moderate and filter traffic.
Set up NIDS sensors to operate in stealth mode, invisible to network hosts and devices.
Place NIDS sensors in promiscuous mode to passively collect traffic without duplicating it.
Configure NIDS sensors in tap/monitor mode to replicate the network traffic non-intrusively.
Answer Description
Placing NIDS sensors in tap/monitor mode would allow the organization to detect unauthorized activities by mirroring the traffic that flows through the network, without injecting any additional latency or load on the primary network path. This strategy helps ensure network performance is not significantly impacted while maintaining an effective security posture. In contrast, inline mode can introduce latency since traffic must flow through the sensor, and promiscuous mode lacks the capability of real-time traffic replication typical of a tap/monitor setup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is tap/monitor mode in NIDS?
How does inline mode differ from tap/monitor mode?
Why is minimizing network impact important in NIDS deployment?
Which type of penetration test involves combining both offensive and defensive techniques to thoroughly assess an organization's security posture?
Defensive Penetration Testing
Integrated Penetration Testing
Physical Penetration Testing
Offensive Penetration Testing
Answer Description
Integrated Penetration Testing involves the collaboration of offensive and defensive techniques to comprehensively evaluate an organization's security. This approach allows for a more effective identification of vulnerabilities by leveraging multiple perspectives and methods.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of integrated penetration testing?
How does integrated penetration testing differ from offensive penetration testing?
What methods are commonly used in defensive penetration testing?
A company's publicly accessible blog has been defaced with political slogans and messages. These unauthorized alterations have not resulted in any financial demand, data theft, or additional malfunctions within the company's IT infrastructure. Which type of threat actor is MOST likely to be responsible for this incident?
Unskilled attacker
Insider threat
Organized crime
Hacktivist
Answer Description
The correct answer is Hacktivist, as their primary motivation is often to promote political or social change, and they are known to deface websites to send a message. This type of activity is consistent with the observed unauthorized alterations containing political slogans without any financial gain or significant disruption of services, which diverges from the modus operandi of other threat actors like nation-states or organized crime groups.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a hacktivist?
How do hacktivists differ from organized crime groups?
What are common techniques used by hacktivists?
What does the term 'impossible travel' signify in the context of security monitoring?
A method by which session hijacking attacks are performed on multiple accounts at once
A warning sign that a user account is accessed from two distant places in a period too short for regular travel, hinting at credential misuse
A security measure taken after multiple unsuccessful login attempts from different locations
A type of race condition vulnerability exploited during security checks
Answer Description
'Impossible travel' refers to a situation where a user account is accessed from geographically distant locations within a timeframe that is too short for normal travel to occur, suggesting the use of compromised credentials. This is an important red flag for security analysts as it may indicate an account takeover by an unauthorized user. In contrast, 'Concurrent session usage' may raise concern but does not imply physical impossibility, 'Account lockout' is a response to suspicious activities and itself is not an indicator, and 'Time-of-check (TOC)' relates to a specific vulnerability type concerning the timing of security checks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools can detect 'impossible travel' events?
How do security analysts verify if 'impossible travel' is a real threat?
How can organizations prevent 'impossible travel' scenarios?
An organization wants to identify the differences between its current security capabilities and the desired future state to improve its overall security posture. Which process should the organization undertake to achieve this goal?
Execute penetration testing
Undertake a gap analysis
Conduct a vulnerability scan
Perform a risk assessment
Answer Description
The organization should conduct a gap analysis. Gap analysis involves comparing the current state of security controls and processes with the desired future state to identify areas that need improvement. By understanding these gaps, the organization can develop a plan to address deficiencies and enhance security measures. Other options like risk assessment, vulnerability scanning, and penetration testing are important but serve different purposes: risk assessment identifies potential risks, vulnerability scanning detects known vulnerabilities, and penetration testing simulates attacks to find exploitable weaknesses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a gap analysis in cybersecurity?
How does gap analysis differ from risk assessment?
When should an organization conduct a gap analysis?
Which of the following options is an attack type or vulnerability that could expose a database's confidential information?
SQL injection
Cross Site Scripting (XSS)
Database Snapshot Attack (DSA)
Port Probing
SSL Privilege Escalation
HTTP Web Scraping
Answer Description
A SQL Injection attack takes advantage of a bug or vulnerability in an application that uses a database such as a web application or API. Structured Query Language (SQL) is the language used by applications internally to query a database for information. If the application takes input from end users it needs to ensure the given information is not SQL. If it fails to do so malicious actors can manipulate the application into sending unauthorized commands to the database.
For example if a web application has a search feature that allows searching by first and last names, SQL could be given instead of a real name and a poorly secured application would pass this SQL to the database directly - allowing malicious actors to query or delete data in the database directly!
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is SQL and how is it used in applications?
How does SQL injection exploit vulnerabilities in applications?
What are some common prevention methods for SQL injection?
Which of the following actions best contributes to securing a server by adhering to the principle of disabling ports/protocols?
Keeping all ports open to ensure full functionality.
Implementing complex passwords for all user accounts.
Changing port numbers for common services to non-standard values.
Closing ports that are not in use by network services.
Answer Description
Closing unused ports on a server helps to minimize the attack surface by ensuring that only necessary network services are accessible. This effectively reduces the number of entry points available to an attacker. Keeping unused ports open does not contribute to security, as it unnecessarily exposes the server to potential exploitation. Switching port numbers can obscure services but does not decrease the attack surface. Using complex passwords is good practice for account security but does not pertain to network services and port/protocol security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to close unused ports on a server?
How can I identify which ports are in use on a server?
What is the difference between changing port numbers and disabling ports?
A company's primary security measure for their sensitive server room is a biometric access control system. Due to a recent natural disaster, the biometric system is temporarily unavailable. Which of the following would be the BEST compensating control to implement immediately to ensure that only authorized personnel can access the server room while maintaining a similar level of security?
Replace the biometric system with a standard key lock.
Set up a temporary key code lock on the server room door.
Implement a sign-in/out log that is monitored by a security guard.
Disable access to the server room until the system is repaired.
CCTV
Answer Description
A sign-in/out log with a security guard would be the best compensating control because it would provide a record of all individuals accessing the server room and could be carefully monitored. While it's not as secure as biometric controls, it is a reasonable temporary measure that also ensures human oversight. Using a key code might still be secure but it doesn't provide an audit trail of who actually enters, as codes can be shared. CCTV is a deterrent and provides a record but does not control access. A standard key lock might be easy to implement but it is less secure than biometrics. A notice is simply a warning and does nothing to secure the area.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is a sign-in/out log with a security guard considered a good temporary compensating control?
Why is CCTV not an appropriate immediate compensating control for access control?
How does a biometric system improve security compared to compensating controls like a security guard or key lock?
A security analyst is tasked with implementing a solution to receive timely data on emerging malware, malicious IP addresses, and known vulnerabilities. Which of the following would BEST fulfill this requirement?
A vulnerability scanner
A security baseline
A Security Information and Event Management (SIEM) system
A threat feed
Answer Description
The correct answer is a threat feed. A threat feed is a real-time or near-real-time stream of data providing information on current and potential cyber threats, including indicators of compromise like malicious IPs, URLs, and malware signatures. A security baseline defines a standard state for a system, a SIEM is used to aggregate and analyze log data from internal sources, and a vulnerability scanner actively probes systems for weaknesses rather than providing a continuous external data stream.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a threat feed and how does it work?
How does a threat feed differ from a SIEM system?
What types of information are typically included in a threat feed?
A healthcare company relies on a virtualized server environment to store sensitive patient records. The IT security specialist is implementing a backup strategy that allows for quick restoration of data with minimal data loss in case of a server crash. Which of the following would be MOST effective for this purpose?
Performing a full backup of the servers on a weekly basis
Setting up differential backups every 48 hours
Using scheduled snapshots of the virtual machines
Configuring incremental backups to be taken daily
Answer Description
Snapshots provide a point-in-time copy of the virtual machine's disk file, which can be used to restore a system back to a particular state with minimal downtime. This makes them highly suitable for environments where data needs to be restored quickly and efficiently, such as in a healthcare company handling sensitive patient records. Traditional backups involve copying files to another location and often result in longer recovery times. Differential and incremental backups, while useful for saving storage space and reducing backup time, do not provide the immediate state recovery that snapshots offer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a snapshot in a virtualized environment?
How are snapshots different from full backups?
Why are snapshots preferred over incremental or differential backups in this case?
Considering your current network security setup only provides notifications when potential security breaches occur, which enhancement would allow the system to not just detect but also proactively counteract malicious traffic?
Implement a system with automatic threat mitigation capabilities
Bolster the organization's data loss prevention (DLP) strategies
Enhance the cryptographic assurance using public key infrastructure (PKI)
Incorporate additional security information and event management (SIEM) features
Answer Description
To address the limitation of a system that only provides notifications when a potential breach occurs, implementing a solution that can take preventative action is necessary. An Intrusion Prevention System is designed to not only detect but to preventively respond to threats by blocking them, therefore enhancing the network's defensive capabilities. The options of bolstering data loss prevention (DLP) strategies, incorporating additional security information and event management (SIEM) features, and enhancing public key infrastructure (PKI) are all valuable in their respective contexts. However, none of these solutions are purposed to block malicious traffic in the way an Intrusion Prevention System would. DLP focuses on preventing data leaks, SIEM centralizes logging and provides threat detection, and PKI deals with encryption and authentication, not inline traffic analysis and intervention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Intrusion Prevention System (IPS)?
How does an IPS differ from a DLP system?
Why isn’t a SIEM system suitable for proactive threat mitigation?
During a routine security audit, the administrator discovers that two different archived log files produce the exact same SHA-1 hash value, even though their contents differ. Which type of cryptographic attack does this finding most likely indicate?
Replay attack
Birthday attack
Downgrade attack
Collision attack
Answer Description
A collision attack specifically targets the collision resistance property of a hash function: it tries to generate two distinct inputs that yield the same hash value. Discovering two different files with an identical digest is the textbook symptom of such an attack.
Why the others are wrong:
- Birthday attack: Although it exploits the birthday paradox to find a collision faster, it does not fit the scenario where a collision has already been observed.
- Downgrade attack: Forces parties to use a weaker algorithm or protocol version; it does not involve identical hashes for different inputs.
- Replay attack: Captures and reuses valid authentication data but does not manipulate hash functions or create identical digests.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are hash functions and why are they important in cybersecurity?
Why is collision resistance significant for hash functions?
How does a Birthday attack relate to a collision attack, and how are they different?
Your organization wants to test its cybersecurity defenses. A penetration test is conducted without making those responsible for defense aware of the test. This type of test is done by which of type of team?
Purple
White
Red
Blue
Answer Description
A penetration test conducted by a Red team is done without the knowledge of the team in charge of defending against intrusions. This allows for the testing of defenses in a more real world like scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of a Red Team in cybersecurity?
How does a Red Team differ from a Blue Team?
Why is Red Team testing performed without the knowledge of defenders?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.