CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which type of threat actor is MOST likely to engage in activities aiming to obtain sensitive information from an organization to demand payment in return for not releasing the information?
Nation-state
Organized crime
Hacktivist
Unskilled attacker
Answer Description
A Blackmail motivation typically involves the threat of revealing sensitive information unless a demand (often for payment) is met, which aligns with the modus operandi of organized crime groups. Organized crime syndicates are known for seeking financial gain through coercion and intimidation, making them the most likely to engage in blackmail. Nation-state actors, while possessing the capability for such actions, are usually driven by espionage or political objectives. Unskilled attackers often lack the expertise to obtain and leverage sensitive information effectively, and hacktivists are generally motivated by political or social objectives, not financial gain through extortion.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What distinguishes organized crime from other threat actors like nation-states or hacktivists?
How do organized crime groups acquire the sensitive information they use for blackmail?
What preventive measures can organizations take to protect against blackmail by organized crime groups?
Which type of digital certificate allows an organization to secure all subdomains of a domain with a single certificate?
Extended Validation certificate
Self-signed certificate
Wildcard certificate
Root certificate
Answer Description
A wildcard certificate allows an organization to secure a domain and all of its subdomains with a single certificate. This is achieved by using an asterisk (*) in the domain name portion of the certificate, representing all possible subdomains. Self-signed certificates are generated by the owner and are not trusted by default by browsers and operating systems. Extended Validation (EV) certificates provide higher levels of trust through a rigorous authentication process but do not inherently support multiple subdomains. Root certificates are used to sign other certificates in a certificate hierarchy but are not used to secure specific domains or subdomains.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a wildcard certificate?
How are wildcard certificates different from Extended Validation (EV) certificates?
How does a root certificate differ from a wildcard certificate?
Which category of security controls involves managing day-to-day activities like incident response and change management?
Operational controls
Physical controls
Technical controls
Managerial controls
Answer Description
Operational controls are focused on the daily operational tasks that maintain security within an organization. They include procedures for incident response, change management, and access controls. These controls ensure that routine activities are carried out securely and effectively. Technical controls involve the use of technology to enforce security, such as firewalls and encryption. Managerial controls are policies and procedures set by management to guide the organization's security strategy. Physical controls are measures put in place to protect physical assets and facilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of operational controls in an organization?
How do operational controls differ from technical controls?
What are some examples of incident response procedures in operational controls?
Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?
Institute policies for secure disposal of printouts and storage media containing the data
Encrypt all data and frequently change encryption keys
Store the data in a physically secure location and enforce strict access controls
Enable detailed logging of all access to the data for audit purposes
Answer Description
Storing information with a 'Restricted' classification in a secure, access-controlled environment ensures that only authorized personnel with the necessary clearance or permissions have access to that data. Keep in mind the question is regarding physical access to the data. While encryption, logging, and secure disposal are important for the overall security posture, they do not inherently restrict access to the data to the appropriate individuals.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of storing data in a physically secure location?
What are physical access controls, and why are they important?
How does enforcing strict access controls differ from logging or encryption?
During a quarterly audit, a company's technology oversight committee uncovers that certain staff members have been utilizing a third-party cloud storage service to share large project files, bypassing the established enterprise content management system due to its upload limitations. This third-party service was not evaluated or sanctioned by the company's technology governance policies. What does this scenario primarily illustrate?
Unauthorized access
Policy violation
Shadow IT
External cloud service compromise
Answer Description
This scenario illustrates Shadow IT, which occurs when employees use unauthorized software or services that have not been reviewed for security by the organization. The key issue with Shadow IT is that it can lead to unmonitored and potentially insecure data storage or transfer, and may not adhere to the company's security and compliance standards. The incorrect options do not specifically address using unsanctioned services and focus more on targeted threats or specific unauthorized actions that do not pose the same broad security risks as Shadow IT.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Shadow IT, and why is it a concern for organizations?
What are some common examples of Shadow IT?
How can organizations manage or prevent Shadow IT effectively?
Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?
Conducting unannounced phishing simulation campaigns
Unannounced network scans after training completion
Including a quiz at the end of the training session
Publishing a quarterly newsletter highlighting social engineering threats
Answer Description
Phishing simulations are a practical method of testing employees' abilities to recognize and respond to social engineering attacks. This type of simulation provides actionable insights by creating realistic scenarios similar to actual phishing attempts, without the associated risk. This helps measure the effectiveness of the training and identifies areas where additional training may be necessary. Answer options like 'Unannounced network scans' and 'Publishing quarterly newsletters' are less direct and less effective methods of assessing the specific understanding of recognizing social engineering attacks. Although helpful in a broader security context, they do not directly test the application of the training content. 'Including a quiz at the end of the training session' can validate immediate retention but does not measure long-term understanding or practical application in an actual work environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are phishing simulations more effective than quizzes for evaluating training?
What is a social engineering attack?
How should phishing simulations be designed for maximum effectiveness?
Which Zero Trust concept continuously evaluates trust signals and adjusts a subject's permissions in real time, thereby shrinking the scope of potential threats?
Adaptive identity
Implicit trust zones
Policy Administrator
Policy-driven access control
Answer Description
Adaptive identity is a control-plane capability that monitors contextual signals-such as user behaviour, device posture, location, and time-and dynamically changes authentication and authorization requirements. By reassessing trust throughout a session, it enforces least privilege and limits an attacker's ability to move laterally.
The Policy Administrator simply establishes or tears down the communication path between the subject and the resource based on decisions from the Policy Engine; it does not perform risk analysis or change permissions on its own. "Implicit trust zones" conflict with the Zero Trust principle of never trust, always verify. "Policy-driven access control" refers broadly to enforcing predefined rules; it may leverage adaptive identity but is not itself the mechanism that performs continuous trust evaluation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Adaptive Identity in the context of Zero Trust?
What are contextual signals, and how are they used in Adaptive Identity?
How does Adaptive Identity differ from Policy-driven Access Control?
A data center's security policy requires that critical network services remain available to users even during equipment failures. To comply with this policy, the network engineer needs to configure a security appliance so that if it experiences a malfunction, legitimate network traffic is not interrupted, though it might reduce security temporarily. Which of the following failure modes should the engineer configure?
Fail-open
Fail-closed
Fail-safe
Fail-secure
Answer Description
Configuring the security appliance to fail-open ensures that in the event of a malfunction, network traffic continues to flow, maintaining availability for users. While this may temporarily reduce security by allowing potentially malicious traffic, it aligns with the policy priority of uninterrupted service. In contrast, fail-closed or fail-secure modes would block all traffic upon failure, prioritizing security over availability, which does not meet the organization's requirements. Fail-safe can be ambiguous but often implies defaulting to a secure state, similar to fail-closed. Therefore, choosing fail-open addresses the need for continuous availability despite equipment failures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does fail-open mean in network security?
How does fail-open differ from fail-closed?
Why might an organization choose fail-open over fail-secure?
Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?
This software can take up disk space, but it does not pose any security concerns.
The software could be useful for productivity, hence poses no significant risk.
This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.
The employees may use this software regularly, which could lead to potential data leaks.
Answer Description
Pre-installed software that is not necessary for the user's activities-commonly called bloatware-can pose a security risk if it contains unpatched vulnerabilities. Because this software is often unmanaged, it can increase the device's attack surface. Attackers may exploit flaws in the unused software or its background services even if employees never actively launch the applications. Therefore, the main concern is the presence of potentially vulnerable code, not how frequently employees use the software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is bloatware, and why is it a security risk?
How can attackers exploit unpatched vulnerabilities in software?
What steps can companies take to mitigate risks from pre-installed software?
A security technician is decommissioning a hard drive that was used to store sensitive financial records. The technician performs a quick format on the drive before sending it to a recycling facility. Which of the following BEST describes the risk of this action?
The action complies with the 'Clear' standard of NIST 800-88 for media sanitization.
The data remains on the drive and can be retrieved using data recovery tools.
The quick format procedure sanitizes the drive by overwriting all data with zeros.
The drive's firmware is wiped, rendering the stored data permanently inaccessible.
Answer Description
The correct answer is that the data remains on the drive and can be recovered. A quick format only removes the pointers to the files in the file system's index (like a table of contents), but it does not erase the actual data stored on the disk. Specialized data recovery tools can easily scan the drive and reconstruct the files, creating a significant data breach risk. Proper sanitization methods, such as those outlined in NIST 800-88 (e.g., overwriting, degaussing, or physical destruction), are required to ensure data is truly unrecoverable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What happens during a quick format?
What does NIST 800-88 recommend for proper media sanitization?
What are data recovery tools and how do they work?
Industry studies of malicious insider incidents (such as the CERT Insider Threat Incident Corpus) reveal that some motivations occur far more often than ideological or philosophical beliefs. Which of the following motives accounts for a larger share of documented malicious insider cases than ideological or philosophical beliefs?
Political or philosophical ideology
Desire for recognition or notoriety
Ethical whistleblowing to expose wrongdoing
Revenge or personal grievance against the organization
Answer Description
Personal grievances that manifest as revenge are a leading driver of malicious insider activity. CERT's analysis attributes more than 70 % of IT-sabotage cases-and roughly one-quarter of all malicious insider incidents-to revenge, whereas ideological or political beliefs appear in well under 15 % of cases. The other listed motivations (ethical whistleblowing, political beliefs, or seeking publicity) do occur but are documented far less frequently than revenge-based actions. Therefore, revenge or personal grievance is the best answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the CERT Insider Threat Incident Corpus?
Why do personal grievances lead to insider threats more often than ideological motives?
How can organizations detect and mitigate insider threats driven by personal grievances?
Crucial Technologies employs software to restrict employees from accessing certain websites or receiving certain types of emails. They are employing what type of control?
IDS
Content filter
IPS
DLP
Answer Description
A content filter is a security control used to block or restrict access to certain websites and/or emails based on their content. This is frequently used by companies to protect the network from malicious sites, prevent phishing attempts, and enforce acceptable use policies by blocking access to unauthorized content. While a DLP system also inspects content, its primary focus is preventing data exfiltration, not blocking inbound access. IDS is a detection-only control, and while an IPS can block traffic, it is primarily focused on blocking malicious activity and exploits, whereas a content filter is policy-based for blocking specific categories of content.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a content filter, and how does it work?
How is a content filter different from DLP systems?
Why is a content filter preferred over IDS or IPS for policy enforcement?
A technology firm headquartered in the United States with no previous international presence is strategizing for expansion into European and Asian markets. Which action is MOST critical for aligning the firm's security practices with external international requirements?
Conduct a thorough analysis of international data protection laws and adapt the company's data privacy framework for compliance with regulations such as GDPR.
Upgrade the encryption algorithms used across the company.
Implement a unified global security policy before assessing the legal considerations of each new market.
Expand the physical security measures at global data centers before considering variations in regional data privacy laws.
Answer Description
When entering new international markets, a firm must prioritize understanding and adhering to the data protection laws specific to those regions. The GDPR in the European Union has stringent requirements for personal data handling, and a similar emphasis on data privacy exists in many Asian jurisdictions. Ensuring compliance with these laws is foundational because non-compliance can lead to severe penalties. While all other options provided are valid considerations for a security program, they do not directly address the legal and regulatory differences introduced by international expansion.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is GDPR, and why is it significant for companies expanding into the EU?
What are some key differences between data privacy laws in Europe (like GDPR) and Asia?
What steps should a company take to ensure compliance with international data protection laws?
Which authorization model grants or denies access to resources based on predefined roles assigned to users?
DBAC
DAC
MAC
RBAC
Answer Description
Role-Based Access Control (RBAC) is an authorization model that grants or denies access to resources based on predefined roles assigned to users. In RBAC, permissions are associated with roles, and users are assigned to these roles based on their responsibilities and job functions. This simplifies access management and reduces the risk of unauthorized access. Other authorization models include:
- Discretionary Access Control (DAC): Access is determined by the owner of the resource.
- Mandatory Access Control (MAC): Access is controlled by the system based on security labels.
- Attribute-Based Access Control (ABAC): Access is granted or denied based on attributes associated with users, resources, and environmental conditions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main benefits of using RBAC?
How does RBAC differ from MAC?
When is DAC preferred over RBAC?
A security analyst, reviewing alerts from an Endpoint Detection and Response (EDR) system, notices suspicious command-line activity on a user's workstation indicative of a malware infection. The analyst needs to contain the threat while preserving evidence for a forensic investigation. What is the BEST immediate action for the analyst to take?
Immediately power off the workstation to stop the malware's execution.
Run a full antivirus scan on the workstation while it remains connected to the network.
Isolate the workstation from the network but leave it powered on.
Disconnect the workstation from the network and immediately re-image it from a known-good backup.
Answer Description
The best immediate action is to isolate the workstation from the network but keep it powered on. Isolating the system prevents the potential malware from spreading to other devices on the network (lateral movement) or communicating with external command-and-control servers. Keeping the system powered on is crucial because shutting it down would erase volatile memory (RAM), which contains valuable forensic evidence like running processes, active network connections, and other in-memory artifacts that are essential for analyzing the attack. Powering off the system immediately would destroy this evidence. Running a scan before isolation could allow the malware to spread further. Re-imaging the system is a remediation step that should only occur after a thorough investigation is complete.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is volatile memory important for forensic investigations?
How does isolating a workstation help prevent lateral movement?
What is the difference between containment and remediation in incident response?
What technique should be used to restrict dedicated administrative access to only the necessary times when it is needed, thereby reducing the exposure time of elevated privileges?
Multifactor authentication
Password vaulting
Security group assignments
Just-in-time permissions
Answer Description
Just-in-time permissions restrict the timeframe during which administrative or elevated rights are granted to users, minimizing the potential for misuse of those privileges. By limiting access to only when it is required for a specific task and automatically revocating those permissions after a set time, the attack window is reduced. This prevents risks associated with standing privileged accounts, which could be exploited if compromised.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are just-in-time (JIT) permissions?
How are JIT permissions implemented in practice?
What are some benefits of using JIT permissions over traditional administrative accounts?
During an incident response exercise, a security analyst needs to follow a set of predetermined, task-level instructions for handling a specific type of malware outbreak. The instructions detail the exact steps for detection, containment, and eradication. What is this type of document called?
Information Security Policy
Risk Analysis Documentation
Change Management Policy
Playbook
Answer Description
The correct answer is 'Playbooks.' In cybersecurity, a playbook is a detailed, step-by-step guide that outlines the procedures for responding to a specific type of security incident, such as a malware outbreak. This document provides task-level instructions for detection, containment, eradication, and recovery. A 'Change Management Policy' governs how alterations are made to IT systems and is not an incident response guide. An 'Information Security Policy' is a high-level document that sets broad security rules for an organization, lacking the specific procedural detail of a playbook. 'Risk Analysis Documentation' is used to identify and assess potential risks, not to provide instructions for responding to an active incident.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of a playbook in incident response?
How is a playbook different from an Information Security Policy?
Why is it important to have predefined playbooks for incidents like malware outbreaks?
An organization is preparing a compliance report that will be submitted to both internal stakeholders and an independent regulatory body. Which of the following would be the BEST approach to ensure that the report satisfies the requirements of both parties?
Include evidence of alignment with regulatory compliance standards and internal policies and procedures.
Focus solely on external compliance mandates without detailing the internal governance mechanisms.
Summarize only the internal auditing procedures followed during the reporting period.
Limit the report to internal risk assessment findings without addressing regulatory compliance standards.
Answer Description
When preparing a report that will be submitted to both internal stakeholders and an independent regulatory body, it is crucial to include evidence of alignment with regulatory compliance standards, as well as internal policies and procedures. This ensures that the report demonstrates adherence to external legal and compliance mandates, while also confirming that internal governance is in line with organizational objectives and practices. Incorrect answers may be plausible, but they do not fully satisfy the dual requirement of adherence to internal policies and external regulations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are regulatory compliance standards?
Why is internal policy alignment important in compliance reports?
What key evidence should be included in a compliance report?
What is a primary method for enhancing the security of a network switch?
Changing the management VLAN to a non-default value
Enabling DHCP on the switch
Disabling unused ports
Configuring multiple VLANs
Answer Description
Disabling unused ports is a primary method for enhancing the security of a network switch. It mitigates the risk of unauthorized access or network taps by reducing the number of active points where a malicious actor can connect to the network. VLAN configuration is crucial for segmenting network traffic and implementing access controls, but it is a practice for organizing and controlling network traffic rather than securing the switch itself. Changing the management VLAN to a non-default value helps minimize risk but is an added measure rather than a primary method. Enabling DHCP on the switch is generally not a security measure; in fact, it could introduce risks if not properly managed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is disabling unused ports an effective security measure?
What is a VLAN, and how does it contribute to network security?
Why is merely changing the management VLAN insufficient for securing a switch?
What type of security device deployment allows network traffic to flow through it, potentially blocking or modifying packets if malicious activity is detected?
Passive sensor
Monitoring device
Tap device
Inline device
Answer Description
An inline security device is placed directly in the path of the network traffic. It has the ability to actively block, permit, or modify the traffic passing through it based on the security policies in place, similar to how a checkpoint can stop or allow traffic in a roadway. In contrast, a tap (test access point) or monitoring device connects to a network segment but does not directly interact with the traffic flow; it merely duplicates the data for analysis, thus incapable of affecting the original traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of an inline security device in a network?
How does a tap device differ from an inline security device?
What is a passive sensor used for in network security?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.