CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following is the BEST deployment option for a company looking to enhance the security of their web applications by monitoring and potentially blocking SQL injection attacks and cross-site scripting attempts?
Deploy a specialized Web application firewall in front of the web server environment.
Install a host-based firewall on the web application server.
Block port HTTP/80 to ensure traffic is encrypted over HTTPS/443 and immune to SQL Injections
Implement a network-based firewall at the network perimeter.
Answer Description
A Web application firewall (WAF) provides specialized protection to web applications by filtering and monitoring HTTP traffic and can specifically target and mitigate threats like SQL injection and cross-site scripting. While network-based, host-based, and cloud-based firewalls can offer protection at different levels, a WAF is specifically designed to secure web applications against these types of web-based threats. A Unified Threat Management (UTM) device provides broad network security solutions but is not specialized in web application security like a WAF is.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are SQL injection attacks?
What is the role of a Web Application Firewall (WAF)?
How does cross-site scripting (XSS) work?
Your company has issued laptops to its employees for remote work. During a routine security audit, you identify that these laptops come with pre-installed software from the manufacturer that is not being used by the employees. What concerns should you have regarding this software from a security perspective?
This software may contain vulnerabilities that could be exploited by attackers because they often go unmanaged and unpatched.
The software could be useful for productivity, hence poses no significant risk.
This software can take up disk space, but it does not pose any security concerns.
The employees may use this software regularly, which could lead to potential data leaks.
Answer Description
Pre-installed software that is not necessary for the user's activities-commonly called bloatware-can pose a security risk if it contains unpatched vulnerabilities. Because this software is often unmanaged, it can increase the device's attack surface. Attackers may exploit flaws in the unused software or its background services even if employees never actively launch the applications. Therefore, the main concern is the presence of potentially vulnerable code, not how frequently employees use the software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are vulnerabilities in software?
What is bloatware and why is it a concern?
How can companies securely manage pre-installed software on devices?
Which of the following physical security controls is designed to prevent unauthorized vehicles from entering a restricted area?
Bollards
Lighting
Fencing
Access control vestibule
Answer Description
Bollards are short, sturdy posts that are installed in a line to prevent vehicles from entering a restricted area. They are an effective physical security control for protecting against unauthorized vehicle access. Access control vestibules, fencing, and lighting are also important physical security measures but do not specifically address preventing vehicle entry.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are bollards, and how do they work as a physical security measure?
What are some advantages of using bollards for security?
How do bollards compare to other physical security measures like fencing and lighting?
A security analyst is reviewing authentication logs and observes a high volume of failed login attempts originating from a single IP address. The attempts are distributed across hundreds of different user accounts, with only one or two password attempts per account before moving to the next. Which of the following security controls is specifically designed to frustrate this type of attack?
Geofencing
Account lockout policy
Password complexity policy
Multi-factor authentication (MFA)
Answer Description
The scenario described is a classic password spraying attack. An account lockout policy is a direct countermeasure that is specifically designed to mitigate such attacks. By locking an account after a small number of failed login attempts (e.g., 3-5), it prevents the attacker from trying even a few common passwords against many accounts without triggering lockouts, which would disrupt the attack and alert security personnel. Multi-factor authentication (MFA) is an excellent control that prevents access even with a compromised password, but it does not stop the password guessing attempts themselves. A password complexity policy makes passwords harder to guess but does not stop the spraying action. Geofencing is only effective if the attack originates from an untrusted geographical location and would not stop a domestic or internal attack.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a password spraying attack?
How does an account lockout policy work?
What are the benefits of implementing an account lockout policy?
During an organization's risk management activities, how should the risk register be maintained?
It should be modified only if a risk actually materializes and causes an incident.
It should be updated only when a new risk is first identified.
It is a living document that must be reviewed and updated on a regular schedule, even when no new risks are identified.
It should be finalized after the initial risk assessment and left unchanged for the remainder of the project or operational period.
Answer Description
The risk register is not a static list created once and forgotten. It is a living document that should be reviewed at defined intervals (for example, during regular risk reviews, project milestones, or after significant environmental changes) even if no new risks have been detected. Regular updates allow the organization to record changes in likelihood or impact, document mitigation efforts, retire risks that are no longer relevant, and add emerging risks. Updating only when a new risk is discovered-or worse, after a risk materializes-fails to keep decision-makers informed of the current risk landscape.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a risk register?
Why is regular review important for a risk register?
What types of risks should be included in a risk register?
What is the primary purpose of classifying data within an organization's security policy?
To assign a level of sensitivity to data and determine appropriate security controls
To reduce the amount of data stored by the organization
To reduce the overall cost associated with data storage and management
To increase the intrinsic value of the organization's data
Answer Description
Classifying data involves assigning a level of sensitivity to data, which helps an organization to determine the appropriate level of security controls and manage risk effectively. This ensures that sensitive information is adequately protected from unauthorized access or leaks. Options such as 'To reduce the amount of data stored' and 'To increase the data's value' are incorrect because classification itself does not specifically aim to reduce storage requirements or directly increase the value of the data. Instead, classification serves to protect data’s integrity, availability, and confidentiality based on its sensitivity level.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different levels of data sensitivity in classification?
What are some common security controls associated with classified data?
How does data classification impact compliance with regulations?
In the context of enhancing security operations, what is a primary benefit of implementing automation?
Minimization of human error in repetitive tasks
Improvement of user authentication protocols
Automated patch management for out-of-date software
Enforcement of stronger password policies
Answer Description
The correct answer is 'Minimization of human error in repetitive tasks,' as automation ensures that repetitive tasks are handled consistently without the same rate of errors that might occur with manual processing, thus saving time and enhancing operational efficiency. While 'Enforcing stronger password policies' and 'Improved user authentication protocols' are positive outcomes, they are not specifically related to the efficiency and timesaving aspect of automation. 'Automated patch management' does streamline updating software but the aspect of reducing human error is more universally applicable to the concept of automation improving efficiency.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific tasks can automation help minimize human error in?
How does automation improve operational efficiency in security operations?
What are some potential risks of relying too heavily on automation in security operations?
Which technology prevents unauthorized access to network resources by inspecting incoming and outgoing traffic and allowing or blocking it according to predefined security rules?
Virtual Private Network
Intrusion Detection System
Firewall
Security Information and Event Management system
Answer Description
A firewall establishes a barrier between trusted and untrusted networks. By evaluating packets against configured security rules, it decides whether to allow or block traffic, thereby preventing unauthorized access. Intrusion detection systems only alert, VPNs encrypt traffic but do not enforce rule-based filtering, and SIEMs aggregate logs without directly controlling traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of firewalls?
What is the difference between a firewall and an intrusion detection system (IDS)?
How does a firewall evaluate incoming and outgoing traffic?
You are on the security team for a manufacturing company. The network architecture group wants to replace the appliance that currently intermediates all outbound web traffic from production servers. The device receives each server's HTTP/HTTPS request, forwards the request to the Internet using its own public IP address, and then returns the response. Because of this design, public web sites can see only the appliance's address, not the private IP of the originating server. Which type of network appliance is the team planning to replace?
Firewall
Router
Switch
Proxy server
Answer Description
A forward proxy server sits between internal clients and external resources. It makes outbound requests on behalf of the clients, so the destination sees only the proxy's public IP address. This hides the internal system's identity, allows content filtering and caching, and can log or inspect traffic.
- A firewall may also perform NAT, but its primary purpose is to enforce security policy, not to proxy application-layer requests.
- A switch operates at Layer 2/3 inside the LAN and does not normally mask IP addresses from external destinations.
- A router moves packets between networks; unless specifically configured as a NAT device or proxy, it does not conceal the internal host at the application layer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Proxy?
How does a Proxy protect internal servers?
What is the difference between a Proxy and a Firewall?
A company plans to revamp its network infrastructure to enhance the ability to centrally manage network traffic and resources while also dynamically adapting to changing business needs. Which networking approach should the company implement to gain control over traffic flow and allow for the rapid provisioning of network services?
Software-defined networking
Network function virtualization
Content delivery network
Traditional network model with static configurations
Answer Description
Software-defined networking (SDN) is the proper choice because it separates the control plane from the data plane, granting centralized management of the network. This central control facilitates fast, programmatically efficient network configuration changes, which traditional models that rely on individual device configurations cannot match. Network function virtualization focuses on optimizing network services themselves rather than providing dynamic traffic management and control, while a content delivery network is a distributed server system designed to serve content to users with high availability and high performance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Software-Defined Networking (SDN)?
How does SDN improve network management compared to traditional models?
What are the differences between SDN and Network Function Virtualization (NFV)?
Which type of control should be implemented to restrict access to a secure data center area, ensuring that only authorized personnel can enter?
Physical access controls
Perimeter controls
Administrative controls
Logical access controls
Answer Description
Physical access controls are designed to restrict entry to physical areas and protect the resources within those areas. They include measures like locks, security badges, mantraps, and biometric systems. Logical controls, on the other hand, refer to mechanisms enforcing access policies in software, such as permissions, authentication methods, and firewalls. Administrative controls involve policies and procedures that govern how organizational security is managed and may include training and awareness programs. Perimeter controls focus more broadly on protecting the organization's boundaries but are not specific to data center access.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of physical access controls?
How do logical access controls differ from physical access controls?
What role do administrative controls play in security?
What type of access control restricts user access to systems based on the current time?
Attribute-based access controls
Time-of-day restrictions
Least privilege
Role-based access controls
Answer Description
Time-of-day restrictions are a type of access control mechanism that limit user access to systems based on predefined time periods. This is to prevent users from accessing the system during times when they should not, such as non-business hours or during maintenance windows. This is not related to the attributes of the user (attribute-based) or their role within the organization (role-based), and it does not necessarily reflect the least privilege principle on its own. Instead, it specifies when the access is permitted, regardless of other attributes or roles.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common applications of time-of-day restrictions?
How can time-of-day restrictions be implemented in a system?
How do time-of-day restrictions differ from other access control methods?
Your company has recently updated its information security policy to include more robust requirements for user authentication. You are tasked with ensuring that password management adheres to the new standards, which include regular password changes and complexity requirements. What is an acceptable method to enforce these updated policies?
Enforce a password history policy that prevents the reuse of the last 24 passwords.
Email users their new passwords monthly to ensure they are regularly updated.
Allow users to reuse the same password with incremental changes, such as adding a number to the end each time.
Implement a policy that mandates password changes only following a confirmed security incident.
Encourage users to write down their passwords and store them securely in their desk drawers.
Avoid informing users about the complexity requirements to ensure they choose passwords that are easy for them to remember.
Answer Description
Implementing a password history policy that prevents the reuse of a specified number of previous passwords ensures that users do not recycle their passwords when a change is required, which enhances security by reducing the potential effectiveness of previously compromised credentials. Other options such as reusing the same password with incremental changes, emailing passwords, or only changing passwords after a security incident do not meet the robust requirements of a stringent information security policy and do not encourage good password hygiene.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a password history policy?
Why are complexity requirements important for passwords?
What are some good practices for password management?
A freshly recruited member of a marketing firm is in the orientation phase and requires guidance on the organization's expectations regarding the use of digital assets and communications networks. To communicate the rules of engagement and the potential sanctions for contravention, which document should be introduced to the recruit?
Response protocol for security breaches
Guidelines for resuming operations after an unplanned event
Organizational roadmap for general security management
Document emphasizing guidelines for digital resource usage
Answer Description
The document commonly known as the Acceptable Use Policy specifies the rules regarding the usage of a company's digital assets and communication networks. It instructs workers on what behaviors are sanctioned and those that are not, as well as detailing what disciplinary measures could be faced for non-adherence. The Business Continuity and Incident Response plans are focused on organizational measures for business stability and reacting to security events, respectively, and do not directly address individual user responsibilities and rules of use for digital assets.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Acceptable Use Policy (AUP)?
What are the consequences of violating an Acceptable Use Policy?
Why are guidelines for digital asset usage important?
ACME Tech, an international software development company, has failed a recent audit due to not keeping adequate records of its European users' data activities. As a security manager, what is the most immediate action to take to rectify this situation and prevent substantial financial repercussions from European regulatory authorities?
Arrange an immediate security training session for the development team to reinforce best practices in secure coding.
Deploy an updated firewall and intrusion prevention system to better protect the perimeter of the corporate network.
Initiate a comprehensive review of the company's physical and electronic access controls.
Correct the record-keeping deficiencies to conform to the data protection standards set forth by European authorities.
Answer Description
When dealing with international data protection standards, maintaining accurate records of user data activities is a legal requirement. If an organization fails to do so, especially within territories governed by strict data protection laws, it risks facing considerable economic sanctions. In this context, the priority after such an audit finding is to ensure that these records are immediately addressed and brought into compliance with the legislation to avoid any impending penalties. Failure to do so could lead to significant fines. The incorrect options, while potentially beneficial to the organization's overall security posture, do not directly address the urgent compliance issue related to record-keeping and the direct threat of fines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the data protection standards set forth by European authorities?
What are the potential penalties for failing to comply with data protection regulations?
How can ACME Tech improve its record-keeping processes to ensure compliance?
An administrator is configuring permissions for a new network share according to the principle of least privilege. Members of the accounting department must be able to add and edit files in the folder. Members from the auditing and sales departments should only be able to review the contents. Which set of permissions should the administrator assign to the accounting, auditing, and sales groups, respectively?
Modify for accounting, Read & execute for auditing, Read for sales
Write for accounting, Read for auditing and sales
Full control for accounting, Read & execute for auditing, Write for sales
Read & execute for accounting, Write for auditing, Modify for sales
Answer Description
The correct set of permissions adheres to the principle of least privilege. The accounting department's requirement to 'add and edit files' is best met with the 'Write' permission. The auditing and sales departments' requirement to 'review the contents' is met with the 'Read' permission. Using 'Read & execute' would be excessive for the auditing and sales teams as there is no requirement to run programs from the share. Granting 'Modify' or 'Full control' to the accounting department would also violate least privilege, as these permissions include rights (like deletion or changing permissions) that were not specified in the requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of file permissions?
What is the principle of least privilege?
Why is Full Control considered excessive permissions in some scenarios?
A company has noticed unusual activity on their network and has started an investigation. As a security analyst, you are reviewing logs from various endpoints to identify the source of the activity. Which of the following log entries would likely indicate a security incident in progress?
Periodic security scanning by the in-house vulnerability management tool.
A single successful login to a user account during working hours.
Repeated login failures from a single source, followed by a successful login to an administrative account.
Scheduled system updates being applied outside of office hours.
Answer Description
Endpoint logs provide invaluable information regarding the activities occurring on individual systems. In this case, repeated login failures followed by a successful login often indicate a brute force attack, where an attacker has repeatedly attempted to log in using different passwords until the correct one is found. This is a common indication of a compromised account, which is why the answer detailing this pattern is correct. The other answers describe events that may be ordinary and not indicative of a security incident, such as a single successful login, periodic security scanning, or regular system updates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a brute force attack?
What should I look for in endpoint logs to identify potential security incidents?
Why do system updates being applied outside of office hours raise concerns?
Which of the following is an example of a possession factor that could be used for multi-factor authentication?
A password
A hardware authentication token
A mobile app authorization request
Eye color
Answer Description
A possession factor is an authentication method based on something the user physically possesses. A hardware authentication token is a small physical device that can generate a secure login code or house digital certificates and is carried by the user to provide a possession factor for authentication. Eye color is a trait, not something possessed. A password is something the user knows, and a mobile app authorization request, while delivered to a device the user possesses, by itself is not considered a possession factor until accepted and is not inherently a physical item.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a hardware authentication token?
What are the other factors in multi-factor authentication?
How does a mobile app authorization request fit into multi-factor authentication?
A multinational corporation with strict data protection policies has discovered unauthorized instances of sensitive information, such as client account details, being shared via email with external parties. To mitigate this risk, which strategy should the security team prioritize?
Applying full disk encryption to all devices within the organization to protect data at rest
Deploying updated antivirus software across all endpoints to address security concerns
Implementing a solution at the network egress points to monitor content and prevent unauthorized transmissions based on predefined policies
Enhancing user access controls on all systems containing sensitive information
Answer Description
Implementing a solution at network egress points is the most effective strategy to mitigate the risk of sensitive data being shared with external parties. Such systems are engineered to scrutinize outgoing information and enforce organizational policies to prevent unauthorized data transfer. By setting up strict rules that analyze the content and context of data being transmitted, the system can detect potential breaches and block the dissemination of sensitive information, especially through emails. While full disk encryption safeguards data at rest, it does not control data being sent out. Access control enhancements may restrict who can access sensitive data but do not necessarily govern the unauthorized transmission of the information. Antivirus applications typically protect against threats like malware and viruses, and may not have the necessary capabilities to prevent data exfiltration.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are network egress points?
How do solutions at egress points monitor content?
Why is full disk encryption not sufficient for preventing data leaks?
Which of the following algorithms is a symmetric encryption algorithm?
Twofish
DSA
Diffie-Hellman
RSA
Answer Description
Only Twofish is a symmetric-key block cipher that uses the same key for encryption and decryption. Diffie-Hellman, RSA, and DSA all rely on public-key (asymmetric) cryptography and therefore do not meet the requirement of being symmetric.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between symmetric and asymmetric algorithms?
What are some use cases for Twofish as a symmetric algorithm?
Why is the security of Twofish considered strong?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.