CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
How can a network administrator secure a switch port to prevent unauthorized devices from connecting to the network, while also mitigating the risk of address flooding attacks?
Enabling 802.1X authentication
DHCP snooping
Implementing switch port security measures
Configuring a captive portal
Answer Description
802.1X authentication provides a method for network devices to authenticate users or devices before allowing them access to the network, which can be effective against unauthorized devices but doesn't address address flooding attacks. Switch port security is indeed the right feature for limiting access to a switch port to a specific number of known devices, thereby preventing both unauthorized network access and mitigating address flooding attacks, which occur when a network device is overwhelmed with data from multiple unknown devices. While a captive portal can restrict access through a web page, it does not inherently prevent device-level access attacks, and DHCP snooping is a security feature that monitors and filters DHCP traffic, which is unrelated to direct switch port security measures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are switch port security measures?
What is an address flooding attack?
How does 802.1X authentication work?
An attacker forces a system to use a weaker encryption protocol that has known vulnerabilities. What type of cryptographic attack is being performed?
Replay attack
Side-channel attack
Downgrade attack
Birthday attack
Answer Description
By forcing a system to use a weaker encryption protocol with known vulnerabilities, an attacker is performing a downgrade attack. This attack leverages older, less secure versions of protocols or ciphers, making it easier to exploit the system. In contrast, a side-channel attack gathers information from the physical implementation of a cryptosystem, a birthday attack exploits the mathematics of hash functions to find collisions, and a replay attack involves reusing valid data transmissions to deceive a system or gain unauthorized access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of weaker encryption protocols that attackers might exploit?
How can systems protect against downgrade attacks?
What is the difference between a downgrade attack and a replay attack?
Which access control method combines elements such as user role, the resource being accessed, and the current time to make an access decision?
Attribute-based access control
Role-based access control
Discretionary access control
Mandatory access control
Answer Description
Attribute-based access control is the correct answer because it is a method that defines an access control paradigm whereby access rights are granted to users through the use of policies that combine different attributes. These attributes can be associated with the user, the resource being accessed, the current time, and even the current environmental conditions. This is different from role-based access control that focuses solely on the roles that users have, discretionary access control which allows owners to define access, and mandatory access control which enforces access based on a centralized policy.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key attributes used in Attribute-Based Access Control (ABAC)?
How does Role-Based Access Control (RBAC) differ from Attribute-Based Access Control (ABAC)?
Can you provide examples of when ABAC is particularly beneficial?
A company has implemented a centralized proxy to manage web traffic. Which of the following tasks would MOST effectively utilize the proxy to enhance the organization's security posture?
Restricting all users' access to the control panel on their respective machines.
Inspecting and logging web traffic for analysis and compliance.
Allowing users to tunnel web traffic through SSH to enhance encryption.
Configuring automatic backups of user data every 24 hours.
Answer Description
Inspecting and logging web traffic allows the centralized proxy to monitor and record all incoming and outgoing web traffic. This inspection aids in identifying suspicious activities, ensuring adherence to organizational policies, and providing valuable information for audits or investigations. Restricting users from accessing the control panel does not primarily utilize the features of a centralized proxy. While tunneling through SSH can encrypt traffic, it would bypass the centralized proxy's filtering and monitoring capabilities. Configuring backups is necessary for data preservation but does not employ the centralized proxy's functions in traffic management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a centralized proxy and how does it work?
What types of suspicious activities can a proxy help identify?
How does logging web traffic aid in compliance and security audits?
You work for a company that processes customers' personal information as part of its business operations. This part of operations presents a risk to the company. What is this type of risk called?
Residual risk
Tolerated risk
Inherent risk
Control risk
Answer Description
Inherent risk is the term used to describe the level of risk involved with using a process/operation before the company does anything to reduce/mitigate the risk.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is inherent risk in detail?
How does inherent risk differ from residual risk?
What strategies can be used to mitigate inherent risk?
What is the primary purpose of using questionnaires in third-party risk assessment and management?
To systematically collect security-related information from third-party vendors
To conduct penetration testing on the vendor's systems
To evaluate the financial stability of the third-party vendors
To legally bind the third-party vendors to a contract
Answer Description
Questionnaires are used to collect specific information about the security practices and policies of third-party vendors to assess their risk level. They are a structured form of inquiry enabling the organization to gather necessary details systematically to inform their risk analysis and make informed decisions regarding the engagement with the vendor.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of questions are typically included in a questionnaire for third-party risk assessment?
Why is systematic data collection important in third-party risk management?
How does third-party risk assessment affect overall organizational security?
When securing a wireless network, which of the following is important for preventing unauthorized access and ensuring that only authenticated users can connect?
Implementing MAC filtering
Enabling WPA3
Using WEP encryption
Hiding the SSID
Answer Description
Enabling WPA3 on a wireless network provides robust security by using modern encryption methods and management of authentication protocols. This prevents unauthorized users from accessing the network without the correct credentials, thereby securing the wireless communication. WEP is an outdated and insecure encryption method that is easily breached by attackers. Hiding the SSID does not provide security, as the network can still be detected by attackers with the right tools. MAC filtering is not a robust security measure because MAC addresses can be easily spoofed.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is WPA3 and how does it work?
Why is WEP considered insecure?
What is MAC filtering and its limitations?
During a routine audit, you discover that an employee has been connecting their workstation to the internet via a public Wi-Fi network at a local coffee shop to complete work tasks when off-site. Which of the following presents the greatest security risk in this scenario?
The age and speed of the Wi-Fi access point in the coffee shop.
Unauthorized software installations on other workstations within the company's secure network.
Outdated anti-virus software on the employee's workstation.
The lack of secure network communication channels on the public network.
Answer Description
Using a public Wi-Fi network exposes the workstation to several security risks, including the potential for man-in-the-middle attacks, unencrypted traffic being intercepted, and unauthorized access to the device. In a coffee shop scenario, these public networks rarely employ strong security protocols. While outdated operating systems and unauthorized software installations can pose threats, the lack of secure network communication is the primary and most direct risk in this situation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are secure network communication channels?
What are man-in-the-middle attacks?
Why is using public Wi-Fi considered risky for work tasks?
What is the primary benefit of using containerization in a security architecture?
It allows unlimited data storage capacity.
It isolates applications to enhance security and manageability.
It integrates all applications into one operating system for better performance.
It completely eliminates the need for physical servers.
It ensures that applications have direct access to hardware resources.
It automates the process of data recovery.
Answer Description
Containerization provides a lightweight alternative to full virtualization by encapsulating an application in a container with its own operating environment. This isolation ensures that applications do not interfere with each other and can be managed independently, enhancing security by containing potential breaches within the isolated environment of the container.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to encapsulate an application in a container?
How does containerization enhance security?
What are some key differences between containerization and virtualization?
An employee receives a text message from the company's technical support team. The message asks to validate the employee's email credentials by replying with their login details due to irregular activities. Which action by the employee aligns with the best security practices in this scenario?
Disregard the message assuming it to be a part of the technical team's routine security checks.
Respond with the email credentials as requested to promptly address the alleged security issue.
Verify the legitimacy of the message by contacting the support team through official company channels.
Inform peers about the request by forwarding the message to create awareness of potential security checks.
Answer Description
The best security practice would be for the employee to validate the authenticity of the message by directly reaching out to the department responsible for technical issues using well-known and official communication channels, rather than through the communication initiated via the text message. This is because legitimate entities responsible for managing sensitive information typically do not solicit such information via SMS, as it is not a secure channel for transmitting sensitive data. Responding directly to the message could lead to a compromise of credentials.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some signs that a message might be a phishing attempt?
What official channels should employees use to contact technical support?
What could be the potential consequences of responding to such messages?
An organization has just deployed a new network infrastructure device and assigned a systems administrator to ensure it is secured. What is the BEST initial action the systems administrator should take to mitigate the risk of unauthorized access due to common credential attacks?
Change the default credentials immediately
Conduct a full vulnerability scan on the device
Enforce account lockout policies
Update the firmware to the latest version
Answer Description
Changing the default credentials is the best initial step for securing new devices. Attackers often use known default usernames and passwords to gain unauthorized access to new system installations. Resetting these credentials to unique and strong username/password combinations significantly reduces the risk of simple but effective attacks. Updating firmware, while important, is generally focused on addressing functional and security issues rather than preventing unauthorized access due to default credentials. Enforcing account lockout policies is more about responding to attack attempts rather than preemptively mitigating the risk. Scanning for vulnerabilities is an ongoing security practice but does not directly address the specific risk of default password use.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to change default credentials on network devices?
What are some examples of strong passwords to use instead of default ones?
What are common credential attacks that organizations should be aware of?
Which of the following best describes a snapshot in the context of data backups?
A point-in-time representation of a system's state or data that does not require storing a full copy of the data set.
A complete copy of a system's data and configurations at a specific point in time.
A method that only backs up data that has changed since the last full backup.
The process of duplicating data in real-time to a secondary location for fault tolerance.
Answer Description
A snapshot is a point-in-time copy of a system's state or data that can be used for backup or recovery purposes. A snapshot is not a full backup; it is a quick method to capture the current state that usually uses copy-on-write technology to minimize storage requirements. Full backups, in contrast, capture all data at one point in time, while replication involves copying data to a secondary location in real-time or near-real-time. Incremental backups are a series of backups that save changes made since the last backup, which could be either another incremental or a full backup.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is copy-on-write technology?
How do snapshots differ from full backups?
What are the benefits of using snapshots for data backup?
A company is required to set up a secure connection between their headquarters and a remote office. The solution must work directly with the Internet Protocol to secure all traffic, support traversal through network address translators, and provide a mechanism for encryption and secure key management. What would be the most suitable protocol to employ for this scenario?
Internet Protocol Security (IPSec)
Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
Secure Sockets Layer/Transport Layer Security (SSL/TLS)
Answer Description
The Internet Protocol Security (IPSec) protocol suite is specifically designed to provide a robust suite of protocols that operate at the Internet Layer of the Internet Protocol Suite, allowing it to secure IP communications by authenticating and encrypting each IP packet in a communication session. It includes functionalities for automated key management, which makes it suitable for scenarios that require secure key exchange mechanisms. It is also capable of Network Address Translator (NAT) traversal, allowing devices behind NATs to use IPSec securely. Secure Sockets Layer/Transport Layer Security (SSL/TLS) usually secures transmissions at a higher layer than the Internet Layer and is commonly implemented for secure web browsing, not for securing all IP traffic. Layer Two Tunneling Protocol (L2TP) is a tunneling protocol that does not provide encryption or confidentiality by itself, which is why it is often combined with IPSec. Point-to-Point Tunneling Protocol (PPTP) has known vulnerabilities and does not offer the same level of security as IPSec.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Network Address Translation (NAT) and how does it work with IPSec?
What is automated key management in IPSec?
What are the main differences between IPSec and SSL/TLS?
A company's web server suddenly experiences an overwhelming amount of traffic, causing legitimate users to be unable to access the website. Investigation reveals that the traffic surge is due to a flood of network requests with spoofed IP addresses, indicating a possible DDoS attack. Which type of DDoS attack is most likely occurring if the attack traffic is magnified by the attackers using public network services without the need for a botnet?
Ping flood attack
Reflected DDoS attack
SYN flood attack
Amplified DDoS attack
Answer Description
An amplified DDoS attack exploits open public network services to enlarge the volume of traffic aimed at a victim. The attacker sends small requests with a spoofed source IP so that the much larger replies are redirected to the victim, dramatically increasing the total traffic without requiring a botnet. Reflected attacks also rely on spoofed IP addresses, but amplification is not necessarily their defining trait. A SYN flood overwhelms the target with half-open TCP handshakes and does not involve amplification, while a ping flood simply sends a high rate of ICMP Echo requests without using intermediary services for amplification.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is an Amplified DDoS attack?
What is the difference between an Amplified DDoS attack and a Reflected DDoS attack?
What are some common public network services used in Amplified DDoS attacks?
Upon discovering a data breach involving unauthorized access to the customer records system, what is the PRIMARY action the security team should focus on according to standard security protocols?
Start documenting the details of the breach and response actions taken.
Immediately isolate affected systems to stop the spread of the breach.
Notify the company's legal team and prepare for public disclosure.
Prioritize the review of security logs to trace the origin of the attack.
Answer Description
The initial focus in the event of a security breach should be to limit the damage and prevent further compromise. This is achieved by containing the threat, thereby stopping the incident from affecting additional resources. While documenting the events and notifying appropriate parties are also important, these actions occur after the immediate threat has been controlled to prevent exacerbation of the situation. Analyzing logs is part of the subsequent investigation and not the immediate concern when a breach is in progress.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is isolating affected systems the priority during a data breach?
What standard security protocols should be followed after isolating systems?
What are security logs, and why are they important in breach investigations?
Wow!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.