CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A company wants to enhance the defense against unauthorized access in its server room. Which of the following methods should be implemented to achieve the utmost assurance of restricting entry based on verifying unique individual traits?
Maintaining sign-in logs at the entrance monitored by security personnel
Biometric access control systems
Installation of surveillance cameras, known as closed-circuit television (CCTV), system around the server room
Implementing coded access cards for secure doors
Answer Description
Implementing biometric access control systems is considered the highest standard for securing areas because it relies on verifying unique individual traits such as fingerprints or iris patterns, which are extremely difficult to duplicate, offering a superior level of security over other forms of access control. On the other hand, using coded access cards can be more vulnerable as they can potentially be stolen or cloned. While installing surveillance cameras, known fully as closed-circuit television (CCTV), can be a strong deterrent and provides a way to monitor and record entrance to facilities, it does not inherently prevent access. Likewise, sign-in logs offer visibility into who enters a server room but rely on manual verification and do not provide the same high level of security validation as biometric systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometric access control systems?
How do biometric systems compare to coded access cards?
What are some common biometric methods used for access control?
An organization has decided to implement an application allow list policy to reduce the risk of malware infections on its network. Which of the following best describes the action the organization is taking?
Permitting all installed software to run but monitoring their behaviors for any suspicious activity.
Creating a list of authorized software that is allowed to run on company systems.
Compiling a list of software that users believe should not be installed on their systems.
Allowing users to decide which software can be executed on their individual workstations.
Answer Description
Implementing an application allow list involves creating a list of approved software that is permitted to run on company systems, effectively preventing any non-approved software from executing. This method enhances security by ensuring that only trusted applications are allowed to operate, thus minimizing the likelihood of malicious software running on the network. Options suggesting users decide on the software or only listing unapproved software do not conform to the concept of an application allow list. Allowing any installed software to run would defeat the security benefits of an allow list.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an application allow list and how does it work?
How does an application allow list help in preventing malware infections?
What are the differences between an allow list and a block list?
Which network appliance is primarily used to balance traffic among multiple servers to enhance performance and scalability?
Proxy server
Jump server
Load balancer
Intrusion prevention system (IPS)/intrusion detection system (IDS)
Answer Description
A load balancer is used to distribute network or application traffic across multiple servers, which improves responsiveness and increases availability of applications. It is designed to prevent any one server from becoming overloaded with too much traffic, which can degrade performance or cause outages. Proxies may balance requests but are not primarily designed for load balancing, while an IPS/IDS focuses on monitoring and analyzing network traffic for any malicious activity. Jump servers are utilized to manage access to devices within a security zone.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of load balancers?
How does a load balancer improve performance?
What is the difference between a load balancer and a proxy server?
Which type of security control is designed to limit the damage and impact after a security incident has occurred?
Detective controls
Compensating controls
Preventive controls
Corrective controls
Answer Description
Corrective controls are implemented to minimize the extent of damage caused by a security incident after it has taken place. These controls focus on containing the incident, recovering from it, and preventing similar incidents from occurring in the future. Examples of corrective controls include incident response plans, backup systems, and disaster recovery procedures. Preventive controls aim to prevent incidents from happening in the first place, while detective controls identify and respond to ongoing incidents. Compensating controls serve as a substitute for primary controls when they are not feasible or practical to implement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of corrective controls?
How do corrective controls differ from preventive controls?
What is an incident response plan and why is it considered a corrective control?
You are a network security technician at a mid-sized company. Your employer is planning for significant growth and the CIO has tasked you with implementing a system to consolidate all critical network device logs to a central location. The system should support logs from all routers, firewalls, switches and business critical servers and should send alerts in the event of security issues. What type of solution would best meet these requirements?
Central log point
SIEM
Hardware security module
DLP
Answer Description
Security Information and Event Management (SIEM) systems are used to centralize logging and alerting from various types of network devices. Common functionalities include data aggregation, alerting, forensic analysis and data retention/compliance. They are most commonly found in mid-size to larger networks where there are too many devices to monitor separately.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does SIEM stand for and what does it do?
What are the main functionalities of a SIEM system?
How do SIEM systems differ from DLP and Central Log Points?
What term describes the process of determining whether a detected vulnerability is actually present?
False positive
Confirmation
Threat hunting
Reporting
Answer Description
Confirmation is the correct term because it involves verifying whether a detected vulnerability by a scan or a security tool truly exists and is not a false positive. It's important for security professionals to accurately confirm vulnerabilities to prioritize remediation efforts and avoid wasting resources on issues that aren’t actual vulnerabilities. A false positive, on the other hand, would refer to erroneously identified issues that are not actual vulnerabilities, and reporting is related to the communication of findings, not the verification of them. Threat hunting is the proactive search for threats that are not detected by automated systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are false positives in vulnerability assessments?
Why is confirming vulnerabilities important in cybersecurity?
What is threat hunting, and how does it differ from confirmation?
Your company has recently rolled out a new security awareness training program focused on recognizing social engineering attacks. To ensure the effectiveness of the training, what is the MOST effective method to evaluate employee understanding and application of the training content?
Including a quiz at the end of the training session
Unannounced network scans after training completion
Publishing a quarterly newsletter highlighting social engineering threats
Conducting unannounced phishing simulation campaigns
Answer Description
Phishing simulations are a practical method of testing employees' abilities to recognize and respond to social engineering attacks. This type of simulation provides actionable insights by creating realistic scenarios similar to actual phishing attempts, without the associated risk. This helps measure the effectiveness of the training and identifies areas where additional training may be necessary. Answer options like 'Unannounced network scans' and 'Publishing quarterly newsletters' are less direct and less effective methods of assessing the specific understanding of recognizing social engineering attacks. Although helpful in a broader security context, they do not directly test the application of the training content. 'Including a quiz at the end of the training session' can validate immediate retention but does not measure long-term understanding or practical application in an actual work environment.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are phishing simulations, and how do they work?
Why are unannounced phishing attacks more effective than quizzes?
What other methods can companies use to reinforce training on social engineering attacks?
Which of the following measures is MOST effective in preventing vehicular access to a facility’s entrances?
Access control vestibule
Security guard
Bollards
Fencing
Answer Description
Bollards are designed to stop vehicles from entering restricted or sensitive areas, providing a high level of security against vehicular threats. They are often used at the perimeter of sensitive buildings to prevent potential attacks from vehicles. Fencing can deter or delay intruders but is less effective at stopping vehicles. Access control vestibules are more about managing individual access and less about vehicular threats. Security guards can be effective but may not be able to physically stop a vehicle without additional barriers like bollards.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are bollards and how do they work?
What situations are bollards most useful in?
How do bollards compare to other security measures like fencing or security guards?
An organization is considering updating their wide area network architecture to improve the management of security policies and the application of security updates across the network. What is the PRIMARY security benefit of transitioning to a Software-Defined Wide Area Network?
Centralized management of security policies and updates
Dynamic path selection for bandwidth optimization
Optimized performance through application-aware routing
Reduction in operational costs by utilizing virtualization
Answer Description
A Software-Defined Wide Area Network (SD-WAN) provides centralized management, enabling organizations to apply security policies and updates uniformly across the network with ease. This centralized approach not only simplifies the administration of the network but also ensures consistent security measures are in place throughout, addressing the organization's need for improved security management. While the option of improved performance through optimized routing is a benefit of SD-WAN, it is not inherently a security benefit. Reduction in operational costs mainly pertains to financial aspects rather than direct security enhancements. Similarly, the ability to dynamically change network paths is a performance-related benefit, but it's not the primary security advantage that SD-WAN offers.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Software-Defined Wide Area Network (SD-WAN)?
What are some key components or features of SD-WAN?
How does centralized management improve security in SD-WAN?
Which method is leveraged by system administrators in an operating system to prevent the execution of unauthorized software, regardless of whether it is malicious?
Allowing automatic administrative privilege elevation
Restricting the allocation of system resources to the software
Implementing strict file permissions
Application whitelisting
Answer Description
Application whitelisting allows only pre-approved applications to run on a system, effectively preventing the execution of any software, including potentially unwanted programs, that is not explicitly authorized. This proactive security measure ensures a higher degree of control over the applications that can be executed, significantly reducing the attack surface. Other options, such as permission elevation prompts and resource allocation, do not prevent the execution of unauthorized applications; instead, they manage how applications run and what permissions they have.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is application whitelisting?
How does application whitelisting differ from blacklisting?
What are the benefits of application whitelisting?
A corporation with a large number of Internet of Things (IoT) devices deployed across multiple office locations is reviewing its security architecture to address concerns regarding the unauthorized disclosure of sensitive data collected by these devices. Which of the following security approaches would BEST mitigate this risk?
Implement network segmentation to restrict IoT traffic to a dedicated portion of the network.
Enable full disk encryption on all IoT devices to protect data at rest.
Enable a host-based firewall on each IoT device to prevent unauthorized access.
Require multi-factor authentication for all users accessing the IoT devices.
Answer Description
Implementing network segmentation would be the most effective at mitigating the risk as it restricts the traffic between the IoT devices and the rest of the network, reducing the potential attack surface and the chance of an attacker reaching sensitive data if the IoT devices are compromised. While full disk encryption is important for data at rest, it doesn't address the transmission or collection of data. Enabling a host-based firewall on IoT devices may not be feasible due to their limited computing resources and wouldn't protect against attacks exploiting the IoT network itself. Requiring multi-factor authentication (MFA) improves the security of user accounts, but it does not specifically address the issue of securing sensitive data collected by IoT devices from network-based threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is network segmentation and how does it improve security?
Why is full disk encryption not sufficient for securing IoT devices?
What are the limitations of using host-based firewalls on IoT devices?
An organization is considering acquiring new hardware components from an unfamiliar manufacturer. As the security analyst, you are tasked with evaluating potential risks before making the purchase. Which of the following actions should you take to conduct a thorough supply chain analysis?
Arrange a demonstration of the equipment's features by the vendor's sales team.
Verify that the equipment integrates with the organization's current network setup.
Investigate the vendor's compliance with international trade regulations and industry standards.
Examine the vendor's component sourcing and manufacturing processes for security vulnerabilities.
Answer Description
Examining the vendor's component sourcing and manufacturing processes for security vulnerabilities is essential in a supply chain analysis. This helps identify risks such as counterfeit parts, tampered hardware, or insecure manufacturing practices that could compromise the organization's security. Investigating trade compliance focuses on legal and regulatory adherence, not specific security risks in the supply chain. Arranging a product demonstration assesses functionality but does not reveal underlying security issues. Verifying compatibility ensures the hardware works with existing systems but does not address potential security vulnerabilities introduced by the new hardware.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are common security vulnerabilities I should look for in a vendor's component sourcing and manufacturing processes?
How can I determine if a vendor complies with industry standards and regulations related to cybersecurity?
What steps can I take to conduct a more comprehensive supply chain analysis?
You just got a new Microsoft Windows laptop. The laptop includes a biometric fingerprint scanner to log into the laptop in addition to your unique username. What type of multi-factor authentication is your fingerprint?
Something you can do
Something you are
Something you have
Something you know
Answer Description
“Something you are” is some physical characteristic of the user. This can be a fingerprint, eye iris, voice, etc. These characteristics are referred to as biometrics.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are biometrics in the context of security?
How does multi-factor authentication work?
What are the benefits of using biometric security features?
Which of the following authorization models uses a set of protocols designed for passing the authorization and authentication information of a user between different security domains?
Discretionary Access Control (DAC)
Role-Based Access Control (RBAC)
Federated identity management
Mandatory Access Control (MAC)
Answer Description
Federated identity management allows a user's identity, authenticated in one security domain, to be accepted in other security domains. It often employs protocols like SAML and OpenID, enabling Single Sign-On (SSO) capabilities across different organizations or services. Discretionary Access Control (DAC) gives the owner of the resource the control to decide who has access. Mandatory Access Control (MAC) is a model where access is granted based on information clearance and classifications, and is not about passing user information across security domains. Role-Based Access Control (RBAC) assigns permissions to roles instead of individual users, which isn't specifically designed for sharing authentication and authorization data across different domains.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are SAML and OpenID?
What is Single Sign-On (SSO)?
How do the different access control models (DAC, MAC, RBAC) compare to federated identity management?
A country's primary power grid and water treatment facilities have experienced a series of sophisticated, coordinated cyber attacks aimed at causing widespread service disruption. Which of the following threat actors is MOST likely responsible for this type of attack?
Nation-state
Organized crime
Insider threat
Hacktivist
Answer Description
The correct answer is 'Nation-state'. Nation-state actors possess high levels of sophistication, resources, and funding, and their motivations often include espionage, political gain, and disrupting the critical infrastructure of other nations. Attacks on power grids and water facilities are characteristic of cyber warfare campaigns intended to cause significant societal and economic harm.
- Organized crime is primarily motivated by financial gain and is more likely to use ransomware or steal data for extortion rather than cause widespread service disruption for its own sake.
- A hacktivist is typically motivated by political or social beliefs and usually conducts less sophisticated attacks like website defacement or DDoS attacks against specific organizations, lacking the resources for a large-scale infrastructure attack.
- An insider threat acts from within an organization, and while potentially disruptive, is less likely to orchestrate a widespread, coordinated attack on national critical infrastructure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are nation-state actors in cybersecurity?
What is critical infrastructure?
What are some examples of attacks on critical infrastructure?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.