CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which method is leveraged by system administrators in an operating system to prevent the execution of unauthorized software, regardless of whether it is malicious?
Application whitelisting
Allowing automatic administrative privilege elevation
Implementing strict file permissions
Restricting the allocation of system resources to the software
Answer Description
Application whitelisting allows only pre-approved applications to run on a system, effectively preventing the execution of any software, including potentially unwanted programs, that is not explicitly authorized. This proactive security measure ensures a higher degree of control over the applications that can be executed, significantly reducing the attack surface. Other options, such as permission elevation prompts and resource allocation, do not prevent the execution of unauthorized applications; instead, they manage how applications run and what permissions they have.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is application whitelisting?
How does application whitelisting differ from blacklisting?
What are the benefits of application whitelisting?
What is the primary role of monitoring in relation to indicators within a security infrastructure?
Enforcing policy by shutting down systems that do not adhere to predefined configurations
Remediating vulnerabilities to prevent the exploitation of a system
Conducting retrospective analysis to determine the root cause of a security incident
Identifying unusual patterns or behavior that may signify a security incident
Answer Description
The primary role of monitoring in relation to indicators within a security infrastructure is to identify unusual patterns or behavior that may signify a security incident. While it might also help in enforcing policy by triggering alerts when anomalies are detected, and can be instrumental in retrospective analysis after an incident, its essential function centers on the prompt detection of potentially malicious activity. Understanding the nuances of monitoring's main role is important in distinguishing it from ancillary benefits such as policy enforcement or post-incident analysis.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are indicators in a security context?
How do security teams monitor for unusual patterns?
What is the difference between monitoring and retrospective analysis?
Security professionals often advise against jailbreaking (iOS) or rooting (Android) a corporate-owned mobile device. Which of the following best explains why this practice is considered a significant security risk?
It forces the device to install apps exclusively from the official app store, reducing exposure to malware.
It disables built-in code-signing and sandbox protections, allowing unvetted apps to run with elevated privileges.
It automatically enables full-disk encryption by default, making user data inaccessible to attackers.
It ensures the device continues to receive manufacturer security patches sooner than stock devices.
Answer Description
Jailbreaking or rooting bypasses the manufacturer's code-signing and sandbox controls, granting the user and any installed application root-level privileges. Without these protections, unvetted software can run unrestricted, dramatically enlarging the attack surface and making malware infection, data theft, and further privilege escalation far more likely. By contrast, the other statements are incorrect: jailbreaking removes app-store restrictions instead of enforcing them, does not automatically enable encryption, and typically prevents or delays future security updates from the vendor.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main security controls that can be removed by jailbreaking?
What are the potential consequences of exposing a device to increased security risks?
What are some legitimate reasons for jailbreaking a device?
Which operational control involves identifying, containing, and recovering from security incidents?
Change management
Incident response
Access controls
Answer Description
Incident response is the correct answer because it is an operational control that focuses on identifying, containing, and recovering from security incidents. Change management is incorrect because it deals with managing changes to systems and applications, not specifically security incidents. Access controls are preventive measures that limit access to resources, but do not directly address incident handling.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main phases of an incident response plan?
What is the difference between incident response and change management?
What types of incidents are typically handled in incident response?
A financial services company relies on a third-party for its core customer relationship management (CRM) software. During a routine review, the company's security team discovers that the vendor has no formal process for security audits and lacks clear contractual security obligations. Which of the following would be the MOST effective initial step to mitigate the supply chain risk posed by this vendor?
Isolate the CRM software on a dedicated, segregated network segment.
Immediately begin searching for an alternative CRM vendor with a better security reputation.
Establish contractual security requirements and a right-to-audit clause with the vendor.
Encrypt all data in transit between the company's network and the vendor's CRM software.
Answer Description
The most effective initial action is to establish formal security requirements and conduct regular assessments. This directly addresses the core issue of a lack of security oversight for the vendor. By contractually mandating security standards and verifying them through audits, the company can ensure the vendor's security posture meets its requirements, mitigating the risk of a supply chain attack. While isolating the software and encrypting traffic are valuable technical controls, they do not address the vendor's internal security weaknesses. Switching vendors is a drastic step that may not be immediately feasible and introduces new risks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are supply chain attacks?
What types of security assessments should be conducted for third-party vendors?
What are some stringent security requirements that can be imposed on vendors?
A company is about to enter into an agreement with a cloud service provider. Which of the following should the company primarily focus on to ensure timely and effective remediation of service interruptions?
Annualized Loss Expectancy (ALE)
Recovery Time Objective (RTO)
Reconnaissance
Mean Time to Repair (MTTR)
Answer Description
The Recovery Time Objective (RTO) specifies the target amount of time a service provider aims to restore a business process after a disruption and is therefore the primary focus when ensuring timely restoration of services as per the service-level agreement (SLA). Mean Time to Repair (MTTR) refers to the average time to repair a broken component, which, although important, is not specific to service-level targets for business processes. Annualized Loss Expectancy (ALE) is used in risk assessment and financial impact analysis, not in SLAs. Reconnaissance is related to information gathering, typical in security assessments like penetration testing, and is unrelated to SLAs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does Recovery Time Objective (RTO) mean?
How is RTO different from Mean Time to Repair (MTTR)?
What is a Service-Level Agreement (SLA) and why is it important?
An organization is undergoing a major upgrade to their existing network infrastructure. Which of the following would BEST ensure that the security implications of the upgrade are appropriately addressed before deployment?
Approval Process
Maintenance Window
Impact Analysis
Updating Diagrams
Answer Description
Conducting an impact analysis ensures that any potential consequences of a planned change-such as a major network upgrade-are identified and mitigated ahead of time. By analyzing the impact, the organization can recognize security risks, adjust controls, and prepare countermeasures before deployment. While the other choices are valid components of change management, they do not specifically focus on assessing security implications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Impact Analysis?
Why is conducting an Impact Analysis important for network upgrades?
What are the other components of change management in relation to network upgrades?
What type of backup is a copy of the entire state of a system and it can be used to restore that system and other similar systems to that exact state/configuration?
Differential
Full
Incremental
Image
Answer Description
A system image is a copy of the entire state of a system. That image can be used as a way to restore the system it came from to that exact state or it can be copied onto other similar system to bring them all to a uniform state.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a system image backup?
How does a system image differ from other types of backups?
When would I need to use a system image backup?
What process converts plaintext into a coded format to prevent unauthorized access?
Tokenization
Hashing
Encryption
Obfuscation
Answer Description
Encryption is the process of converting plaintext into a coded format known as ciphertext, which can only be read by authorized parties who have the decryption key. This process uses an algorithm and a key to transform the readable data into an unreadable format, thereby protecting the data from unauthorized access or eavesdropping.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is encryption and how does it work?
What is the difference between encryption and hashing?
What are common encryption algorithms used today?
What term is used to describe the process by which the urgency and importance of a security incident are increased to ensure adequate attention and resources are allocated to resolve it?
Amplification
Escalation
Intensification
Elevation
Answer Description
'Escalation' is the correct term for the process in which the urgency and importance of an incident are increased, often involving a higher level of management or additional resources. This ensures that the situation is handled appropriately as it unfolds. 'Elevation' commonly refers to raising user privileges, which is not directly related to the organization-wide approach to managing an incident. 'Intensification' can be misleading, but it's not commonly used in the nomenclature for incident management. 'Amplification' is a term that could indicate an increase in intensity or scope but isn't typically used in the context of incident response procedures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common scenarios that might require escalation in incident management?
How does escalation impact decision-making during a security incident?
What is the difference between escalation and elevation in the context of security incidents?
An organization uses electronic door locks that require employee badges to access secure areas. The company wants to ensure that during a power outage, the doors to sensitive areas remain locked to maintain security, while emergency exits allow personnel to evacuate safely. Which setting should be applied to the locks on sensitive areas to meet this requirement?
Fail-open
Fail-closed
Fail-over
Load balancing
Answer Description
The locks on sensitive areas should be configured to 'fail-closed', meaning they remain locked when power is lost. This ensures that secure areas remain protected even during a power outage. Configuring the locks to 'fail-open' would unlock the doors upon power failure, compromising security of sensitive areas. 'Fail-over' and 'Load balancing' are not relevant settings for door locks; 'Fail-over' relates to system redundancy, and 'Load balancing' distributes workloads across resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'fail-closed' mean in the context of electronic locks?
Why is 'fail-open' considered insecure for sensitive areas?
What are 'fail-over' and 'load balancing', and how do they differ from fail-safe mechanisms?
During a routine audit, you discover that an employee has been connecting their workstation to the internet via a public Wi-Fi network at a local coffee shop to complete work tasks when off-site. Which of the following presents the greatest security risk in this scenario?
The lack of secure network communication channels on the public network.
Outdated anti-virus software on the employee's workstation.
The age and speed of the Wi-Fi access point in the coffee shop.
Unauthorized software installations on other workstations within the company's secure network.
Answer Description
Using a public Wi-Fi network exposes the workstation to several security risks, including the potential for man-in-the-middle attacks, unencrypted traffic being intercepted, and unauthorized access to the device. In a coffee shop scenario, these public networks rarely employ strong security protocols. While outdated operating systems and unauthorized software installations can pose threats, the lack of secure network communication is the primary and most direct risk in this situation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are secure network communication channels?
What are man-in-the-middle attacks?
Why is using public Wi-Fi considered risky for work tasks?
A company's information security policies have not been updated in five years. Which of the following is the MOST significant security-related risk of using these outdated policies?
The cost of training employees on the outdated policies will increase.
The policies may no longer comply with new data privacy regulations.
The policies may fail to address emerging threats and vulnerabilities.
The policy documents may refer to decommissioned systems and applications.
Answer Description
The primary security-related reason to regularly review and update security policies is to ensure they address the current threat landscape. Cyber threats, technologies, and business processes evolve constantly. Outdated policies may not provide sufficient guidance to protect against modern attack vectors, leaving the organization vulnerable. While regulatory compliance is a critical reason for policy updates, failing to protect against current threats poses a more direct and immediate risk to the organization's security posture.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to regularly review security policies?
What are some common elements included in security policies?
What could happen if security policies are not updated regularly?
A company needs its critical applications to remain operational with minimal downtime, even in the event of hardware failures. Which strategy is most appropriate to meet this requirement?
Implementing a server cluster with load balancing
Using a single powerful server with redundant components
Deploying encryption to secure data at rest
Scheduling regular system updates during low usage periods
Answer Description
Implementing a server cluster with load balancing is the most effective strategy for maintaining operations during hardware failures. Load balancing distributes traffic across multiple servers, so if one server fails, others can handle the load seamlessly, ensuring high availability. Using a single powerful server, even with redundant components, still presents a single point of failure. Regular updates and encryption are important for security and maintenance but do not directly address the need for continuous operation during failures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a server cluster, and how does it work?
What is load balancing, and why is it important for high availability?
What are the disadvantages of relying on a single powerful server?
A company's network administrator has discovered a system that is exhibiting erratic behavior, including slow performance and repeated crashes. After performing a system scan, the administrator found unauthorized software running with system-level privileges. Which type of malware is MOST likely responsible for these symptoms?
This system is most likely infected by a rootkit aiming to obtain elevated privileges while avoiding detection.
This system is most likely experiencing the effects of a logic bomb that has been activated and is disrupting system performance.
This system is most likely compromised due to a keylogger that is monitoring and transmitting keyboard input, causing system instability.
This system is most likely infected by ransomware which is encrypting files, resulting in performance issues and system crashes.
Answer Description
Rootkits are designed to obtain unauthorized root or administrative access to a computer system while concealing their existence. The symptoms of slow performance, repeated crashes, and unauthorized software running with elevated privileges are indicative of rootkit behavior, as rootkits often attempt to hide their processes, files, and system data to evade detection while maintaining persistent access to the system.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly is a rootkit and how does it function?
How can I detect and remove a rootkit from my system?
What are the differences between rootkits and other types of malware?
That's It!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.