CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A corporation wants to upgrade their security capabilities by deploying a solution that can not only detect threats on individual devices but also aggregate and analyze security data from across the entire IT environment, including network and cloud sources. What is the most comprehensive option that this corporation should consider for enhanced threat detection and system-wide incident response?
User and Entity Behavior Analytics (UEBA)
Extended Detection and Response (XDR)
Endpoint Detection and Response (EDR)
Intrusion Prevention System (IPS)
Answer Description
The most comprehensive option for enhanced threat detection and system-wide incident response is Extended Detection and Response (XDR). XDR solutions expand on the functionality of Endpoint Detection and Response (EDR) by collecting and correlating data across various security layers such as, but not limited to, email, devices, servers, clouds, and networks. By providing this extensive visibility and correlation, XDR allows organizations to detect and respond to threats more efficiently than EDR, which focuses more narrowly on endpoint security. User and Entity Behavior Analytics (UEBA) is a security solution that focuses on understanding user behavior to detect anomalies that may indicate a threat, but does not offer the same breadth of correlation across environments. An Intrusion Prevention System (IPS) provides automatic protection against known threats by analyzing network traffic and blocking attacks in real-time, but like UEBA, it does not offer the comprehensive correlation capabilities of XDR.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Extended Detection and Response (XDR)?
How does XDR differ from EDR?
What types of environments can XDR monitor?
When configuring a security device to ensure that, in the event of a failure, it will maintain a state that prevents traffic from passing through it, which mode should be used?
Fail-open
Fail-safe
Fail-closed
Fail-secure
Answer Description
Fail-closed mode is used in security devices to ensure that if the device fails, it does not allow any traffic through, thereby maintaining the security posture by default. This contrasts with fail-open mode, where the device would allow all traffic through in the event of a failure, potentially compromising security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main differences between fail-closed and fail-open modes?
What are some scenarios where fail-closed mode is essential?
Can other security measures work in conjunction with fail-closed mode?
When implementing changes to a system, which component ensures that if the change fails, the system can be restored to its previous state?
Impact Analysis
Maintenance Window
Backout Plan
Change Approval
Answer Description
A backout plan is essential in change management as it provides a predefined process to reverse changes and restore the system to its previous stable state if the new changes cause issues. This minimizes downtime and helps maintain system integrity. Other options, such as impact analysis, maintenance window, and change approval, are important but serve different purposes: impact analysis evaluates potential effects of the change; a maintenance window is the scheduled time for changes; and change approval is the authorization to proceed with changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a backout plan and how is it created?
What is the importance of an impact analysis in change management?
How does a maintenance window fit into the change management process?
A company has observed that employees are frequently accessing social media sites during work hours, leading to decreased productivity. The IT department decides to update the company's guidelines to address this issue. Which element of the security governance framework should they revise to regulate acceptable internet usage by employees?
Access Control Standards
Information Security Policy
Acceptable Use Policy (AUP)
Incident Response Procedures
Answer Description
Updating the Acceptable Use Policy (AUP) is the appropriate action because the AUP specifically outlines the permissible and prohibited activities regarding the use of company resources, including internet access. Policies like Information Security Policies or Access Control Standards do not directly address acceptable usage behaviors.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific elements should be included in an Acceptable Use Policy (AUP)?
How does an Acceptable Use Policy (AUP) differ from an Information Security Policy?
What can be done if employees continue to violate the Acceptable Use Policy (AUP)?
A financial institution is updating its information security program. Who should be designated as the risk owner for financial data breaches?
The Data Owner
The Security Analyst
The Chief Information Officer (CIO)
The IT Support Staff
Answer Description
The Data Owner is responsible for managing and mitigating risks related to their data. They have the authority and accountability for the data, making them the appropriate risk owners.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the responsibilities of a Data Owner?
What is the difference between a Data Owner and a Chief Information Officer (CIO)?
Why is it important to have designated risk owners for data?
A data-center operations manager is performing a business impact analysis and needs to estimate how long a critical database cluster typically remains functional before an unexpected hardware fault requires repair. The vendor specification lists an MTBF of 75,000 hours for each node. In this context, what does MTBF stand for, and what reliability information does it provide?
Mean Time Between Failures, measuring the average time operational between system breakdowns
Minimum Time Before Failure, reflecting the shortest time a system might operate before encountering an issue
Mean Time Before Fix, representing the average time to repair a system after a failure
Maximum Time Before Failure, indicating the longest time a system can function before it fails
Answer Description
MTBF stands for Mean Time Between Failures. It is the average operational time between one repairable failure and the next. Because it represents the expected interval of proper operation, a higher MTBF indicates a more reliable system that is likely to remain running longer before another failure occurs. MTBF calculations exclude the downtime needed for repairs and are based on historical or test data collected during normal operation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the formula used to calculate MTBF?
How does MTBF relate to other reliability metrics?
Why is a higher MTBF important for businesses?
You have been called to the office of the CEO for a confidential meeting. In the meeting the CEO informs you he 'has a virus that won't let him login without paying a fee.' You begin to investigate the issue and find that the CEO downloaded a file from a website a friend shared on a social media site. After downloading the file his computer restarted and now will not allow anyone to login unless they enter credit card information. Which option best describes the attack used in this scenario based on the information available?
The CEO was the target of a spear phishing social engineering attack
The CEO downloaded and executed Ransomware
A botnet is attacking the CEO's computer and disabling login attempts
The CEO executed a Rootkit which gave backdoor access to a hacker
Answer Description
This type of malware is called Ransomware. It holds data or information ransom until a fee is paid after which point it will return the information or data (or so it says...). Based on the information available in the question this is the only conclusion we can make. It is possible as the CEO of the company they were targeted specifically via social media (spear phishing) but there isn't definitive evidence of this yet.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is Ransomware and how does it work?
What are some common methods ransomware uses to infect computers?
Can Ransomware be removed without paying the ransom?
Which of the following terms describes an attacker trying to steal personal or sensitive information using a VoIP system?
VoIP takeover
Wishing
Phishing
Vishing
Answer Description
Vishing or Voice-Phishing is the use of a telephone or VoIP system to conduct a phishing attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is Vishing?
How does Vishing differ from traditional phishing?
What are some common tactics used in Vishing attacks?
Which tool helps manage and secure privileged accounts by allowing for the temporary issuing of administrative rights and automatically revoking them after a set time period or task completion?
Just-in-time permissions
Password vaulting
Password managers
Ephemeral credentials
Answer Description
Just-in-time permissions are used by privileged access management tools to provide administrative rights on a temporary basis, which are automatically revoked after a set time period or once the designated task has been completed. This reduces the risk of unauthorized access from stale accounts or the misuse of long-standing permissions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are privileged accounts?
How do Just-in-time permissions enhance security?
What is privileged access management (PAM)?
What term best describes an attack that overburdens network systems with an overwhelming amount of traffic, leading to reduced availability or performance for legitimate service requests?
Resource exhaustion
Cross-site forgery
Code injection
Credential harvesting
Answer Description
A 'resource exhaustion' attack aims to consume network or system resources to the point where services become slow or completely unresponsive to legitimate users. The term implies the attacker's goal of using up all available resources, thus 'exhausting' them, which can degrade service performance or lead to a denial of service.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common techniques used in resource exhaustion attacks?
What are the potential impacts of resource exhaustion attacks on businesses?
How can organizations mitigate resource exhaustion attacks?
An IT security manager wants to ensure that users can employ complex and unique passwords for each of their accounts without the need to remember each one individually. Which of the following solutions would best meet this requirement?
Implementing a password manager application
Enforcing strict password complexity and expiration policies
Implementing biometric authentication methods
Deploying single sign-on authentication for all services
Answer Description
Implementing a password manager application allows users to securely store and manage complex and unique passwords for all their accounts. This encourages the use of strong, unique passwords without the burden of memorization. Enforcing strict password policies may lead to password reuse or users writing down passwords. Single sign-on (SSO) reduces the number of passwords but does not promote unique passwords for each service. Implementing biometric authentication enhances security but doesn't address the management of multiple complex passwords.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a password manager application?
How do password complexity requirements work?
What is Single Sign-On (SSO) authentication?
A regional healthcare organization regularly faces threats from severe weather events and has tasked the IT department with enhancing their business continuity plan. Leadership's primary goal is to ensure continuous operation of essential systems with no perceptible downtime in the event of a weather disaster. What update to the business continuity plan would BEST reflect leadership's priority for maintaining uninterrupted essential services?
Outline strict targets for the time to restore essential services and schedules for critical data backups
Build and maintain a facility that is prepared and available on-demand for immediate operational takeover of essential systems
Assemble a control center dedicated to managing communication and coordination during emergency responses
Enhance network infrastructure to manage a higher volume of data traffic during emergency situations
Answer Description
Establishing a facility that is fully prepared and available on-demand, equipped with the necessary resources and operational capability to assume control immediately, is essential for ensuring that there is no perceptible downtime for essential services during a disaster. This aligns with the leadership's priority for maintaining uninterrupted operations. While the other options can contribute to a robust business continuity strategy, they do not directly provide the seamless operational capabilities desired. Aggressive metrics for service recovery time and critical data restoration planning do not secure immediate operational capability and a control center mainly improves coordination, not service continuity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'business continuity plan' mean?
What is meant by 'on-demand operational takeover'?
Why is having a facility for operational takeover more effective than just having a control center?
Your organization is exploring the option of migrating some services to the cloud while maintaining critical systems onsite due to their sensitive nature. As the IT Security Specialist, you've been asked to assess the security considerations for the on-premises systems. Which of the following is a primary security advantage of retaining critical systems on-premises?
Lower initial capital expenditure compared to cloud solutions
Reduced physical access risk to systems
Increased scalability of critical systems
Complete control over physical and logical security measures
Answer Description
Complete control over physical and logical security measures is a primary advantage of on-premises solutions. The organization retains full control over all aspects of security, including access controls, surveillance, and response protocols, which are essential for sensitive systems. Cloud services, while secure, involve sharing some control with third-party providers. 'Reduced physical access risk' implies an advantage, but it is an aspect of complete control rather than a primary advantage in itself. 'Increased scalability' and 'Lower initial capital expenditure' are typically advantages of cloud solutions, not on-prem solutions. Therefore, they are not correct in the context of advantages for maintaining critical systems on-premises.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of physical and logical security measures?
What risks are involved in using cloud services for critical systems?
How does retaining complete control over security benefit an organization?
A company is implementing a security training program for its employees and wants to ensure they are able to identify and appropriately respond to potential security events as they occur. What is the BEST method to enhance their situational awareness?
Conducting real-world scenario-based training exercises
Providing a document with examples of phishing attempts to all employees
Implementing an automated alert system for potential security events
Holding routine security meetings to discuss potential threats
Answer Description
Conducting real-world scenario-based training exercises is the best method to enhance situational awareness. Such exercises simulate potential security events in a controlled environment, allowing employees to recognize and react effectively to different types of threats. These exercises improve the ability to recognize anomalous behavior that could indicate a security incident, thereby enhancing overall situational awareness. While routine security meetings and documented examples of phishing attempts can contribute to situational awareness, they are not as effective as scenario-based exercises that provide hands-on experience. Automated alerts are essential for situational awareness, but they do not replace the need for training employees to identify and respond to threats without the aid of automated systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are real-world scenario-based training exercises?
Why is hands-on training more effective than just meetings or documents?
How do automated alert systems complement security training?
An organization plans to outsource its IT management to a managed service provider (MSP). Which of the following is the most significant security consideration associated with this strategy?
The organization's attack surface will be expanded to include the MSP's environment.
The use of an MSP eliminates the need for internal security monitoring.
The organization can transfer all security liability to the MSP through the service-level agreement (SLA).
The primary purpose for using an MSP is to reduce the capital expenditure on security tools.
Answer Description
When an organization uses a managed service provider (MSP), it extends trust and often privileged access to a third party. This inherently expands the organization's attack surface, as any vulnerabilities in the MSP's environment, personnel, or its own supply chain can become a direct threat to the organization. Attackers frequently target MSPs as a way to compromise their multiple clients. While MSPs can bring specialized expertise, it is a misconception that they eliminate internal security responsibilities or are always more secure. The organization retains ultimate accountability for its security and must manage the risks introduced by the third-party relationship.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is meant by 'attack surface'?
What are managed service providers (MSPs) and their role?
How can organizations manage relationships with external service providers effectively?
Woo!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.