CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
What type of vulnerability within virtualized environments allows an attacker to access the host machine from within a virtual machine?
SQL injection
Buffer overflow
VM escape
Firmware compromise
Answer Description
A Virtual Machine (VM) escape is a security vulnerability that allows an attacker to break out from a virtual machine and interact with the host operating system. This type of vulnerability is particularly concerning because it undermines the isolation properties that are fundamental to secure virtualization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is VM escape?
How does a hypervisor relate to VM escape?
What are some best practices to mitigate the risk of VM escape?
A network administrator for a small business wants to simplify the company's security posture by deploying a single appliance that integrates a firewall, intrusion prevention, content filtering, and anti-malware capabilities. Which of the following network appliances BEST describes this type of all-in-one solution?
Web Application Firewall (WAF)
Proxy server
Unified Threat Management (UTM) appliance
Next-Generation Firewall (NGFW)
Answer Description
A Unified Threat Management (UTM) appliance is the correct answer because it is an all-in-one security solution that consolidates multiple security functions into a single device. This typically includes a firewall, intrusion prevention system (IPS), antivirus/anti-malware, content filtering, and VPN capabilities. A Next-Generation Firewall (NGFW) has many overlapping features but is generally considered a more enterprise-grade product focused on deep packet inspection and application control. A Web Application Firewall (WAF) is specifically designed to protect web applications from Layer 7 attacks, not to be an all-in-one network security device. A proxy server primarily forwards user requests to the internet and can provide content filtering and caching, but it does not encompass the broad range of security features found in a UTM.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a UTM appliance and a Next-Generation Firewall (NGFW)?
What specific security functions are included in a UTM appliance?
Is a Web Application Firewall (WAF) the same as a UTM appliance?
A corporation requires a method to ensure that its staff can connect to internal resources from outside the office environment with assured confidentiality and integrity of data. Which solution would BEST meet this requirement while providing encrypted channels for remote endpoint connectivity?
Setting up remote access servers that allow direct connections from the internet.
Enforcing perimeter security controls that prevent unauthorized network entry.
Configuring encrypted gateways at the network perimeter for enhanced security.
Utilizing end-to-end encrypted tunneling services with access control.
Answer Description
A solution that creates an encrypted tunnel to the corporate network is essential for secure remote access. The most appropriate technology for establishing such secure connections is a solution that encapsulates and encrypts data as it travels over possibly insecure networks, like the internet, requiring proper authentication from the connecting users to access internal network resources. Implementing remote access servers without additional encryption would not ensure data confidentiality and integrity. Configuring encrypted gateways focuses solely on securing gateways but does not address endpoint-to-network secure connectivity. Secure network perimeters enhance the overall network security but do not inherently provide secure remote access capabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is end-to-end encrypted tunneling?
How does a VPN work to secure remote connections?
Why are remote access servers alone not sufficient for secure connectivity?
A security administrator is verifying a new software update from a trusted vendor. The administrator confirms that the update is digitally signed with the vendor's valid code-signing certificate. Why might this update still pose a security risk to the organization?
Code-signing certificates cannot be revoked by the Certificate Authority (CA) once issued.
The vendor's build environment could have been compromised, allowing malicious code to be signed with a legitimate certificate.
Digital signatures only provide confidentiality for the update package through encryption.
A valid digital signature automatically bypasses all antivirus and endpoint protection scanning.
Answer Description
A digital signature provides assurance that a file has not been altered since it was signed (integrity) and that it originated from the holder of the private key (authenticity). However, it does not guarantee the code is free from malware. As seen in major supply chain attacks, if an attacker compromises a vendor's internal build process, they can inject malicious code into the software before it is signed. The software, now containing malware, is then legitimately signed by the vendor, making it appear trustworthy. Another primary attack vector is the theft of a vendor's code-signing private key, which allows an attacker to sign their own malicious files. Therefore, relying solely on a digital signature is insufficient.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a digital signature and how does it ensure integrity and authenticity?
How can a compromised build environment pose a security risk, even with a valid digital signature?
What are the risks if a vendor's code-signing private key is stolen?
Which of the following options is best suited to securely connect remote branches to the corporate network?
Virtual Private Network (VPN)
Wi-Fi calling
Leased lines without additional security protocols
Virtual Local Area Network (VLAN)
Multiprotocol Label Switching (MPLS)
Secure Sockets Layer (SSL)
Answer Description
A Virtual Private Network (VPN) is best suited for securely connecting remote branches to the corporate network because it creates a virtual and encrypted tunnel between two endpoints over a less secure network, typically the internet. VPNs ensure that data transmitted between these locations remains private and protected from eavesdropping or interception. MPLS provides reliable connections but is not specifically designed to secure data in transit. While VLANs can segment network traffic within a local network, they do not extend to remote locations. Wi-Fi calling is not related to connecting branches and focuses on voice over IP services. SSL is a protocol for securing individual connections between web clients and servers, not network branches. Leased lines provide direct connections but are expensive and do not inherently encrypt data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a VPN encrypt data for secure communication?
What are the limitations of MPLS compared to a VPN?
What is the difference between a VLAN and a VPN?
Your coworker identified a vulnerability for a 3rd party software solution hosted on premise. The coworker is out sick today and has asked you remediate this issue as quickly as possible. You have identified a patch to fix the security vulnerability from the vendor's official website. What step should you take NEXT?
Submit a change request based on the companies change management processes
Begin monitoring for related incidients
Start the incident response process
Install the patch immediately and inform affected users
Answer Description
Changes, even urgent ones, should be documented and approved based on company policy. This is typically called something like a "Change Request" or CR, or a "Request For Change" or RFC. This is the first step in deploying updates, configuration changes, etc.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is change management in IT?
Why is it important to follow change management processes before patching a vulnerability?
What is a Change Request or CR in change management?
Which of the following best describes the legal implications that should be considered when managing a security program for an organization operating within a specific country?
Alignment with regional trends
Compliance with national laws and regulations
Following global standards
Adherence to local business norms
Answer Description
The correct answer is Compliance with national laws and regulations, as it directly relates to the obligations an organization has to adhere to the legal framework set forth by the government of the country in which it operates. Non-compliance can result in legal actions, fines, or sanctions against the organization. Local business norms are relevant to cultural practices but do not hold regulatory authority. Regional trends may influence business strategy but lack the legal impact of national laws. Global standards are best practices that might be adopted internationally, yet they do not replace national legal requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the distinction between national laws and global standards in security programs?
What are the consequences of non-compliance with national laws and regulations for security programs?
How can organizations ensure compliance with national laws and regulations when managing security programs?
Your employer recently instituted a new policy that requires employees to sign all internal email communications with their digital certificate. If each employee is using their own unique digital signature what will this provide for the company?
Confidentiality
Integrity
Non-repudiation
Availability
Answer Description
Non-repudiation links an action to an individual using a unique identifier. For example, it provides assurance that an email was actually sent by the sender or it connects a user to a change they made on the network so they can't deny they made the change.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a digital certificate?
How does non-repudiation work in email communications?
What is the role of a Certificate Authority in this process?
You receive a call and the caller ID indicates that it is from your bank. You answer and are told that your account has been compromised. The person on the phone says that before they can proceed you need to verify your account number and security pin. What term best describes this type of social engineering attack?
Whaling
Spear phishing
Smishing
Vishing
Phishing
Answer Description
Vishing (also called voice phishing) is conducting phishing attacks using telephony. This often involves using VoIP features such as caller ID spoofing to avoid detection.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between vishing and phishing?
How does caller ID spoofing work in vishing attacks?
What steps can you take to protect yourself from vishing attacks?
After a recent data breach where an adversary successfully exfiltrated sensitive data, the incident response team has completed the containment and eradication stages. Which action would BEST equip the team to perform root cause analysis and determine the original vulnerability exploited?
Conducting a thorough analysis of security logs for signs of initial compromise
Initiating a campaign to re-educate all users about phishing and social engineering
Running a comprehensive vulnerability scan on all networked systems
Scheduling a complete review of all organizational security policies and procedures
Answer Description
Conducting a thorough analysis of the security logs, especially around the time of the breach, will likely reveal the sequence of events that led to the breach, including the initial point of entry and methods used by the attacker. This detailed trail is indispensable for pinpointing the original vulnerability or misconfiguration that the attacker exploited. Simply running a vulnerability scan might identify potential vulnerabilities but would not confirm which were actually exploited. Organizational policy review and user education, while important, are less likely to directly lead to the discovery of the specific exploited vulnerability.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are security logs critical for root cause analysis after a breach?
How do security logs differ from vulnerability scans?
What tools can be used to analyze security logs effectively?
An organization's staff is distributed across varying locations, each with varying levels of network security. To strengthen their security posture for collaborative efforts, which measure would be most effective in ensuring authorized access to shared company resources?
Mandate email encryption for all internal and external communication.
Enforce a policy requiring users to change their passwords monthly.
Limit the connection times to shared resources to specific hours of the working day.
Implement multi-factor authentication for all users when accessing shared company resources.
Answer Description
Implementing multi-factor authentication (MFA) provides a powerful defense against unauthorized access, as it requires users to provide two or more verification factors to gain access to resources, thus protecting against compromised credentials. Email encryption is a security measure that protects the contents of emails but does not secure access to collaboration tools and resources. While limiting connection times could potentially reduce the window of opportunity for an attack, it would not be practical for collaboration needs and does not strengthen authentication methods. The frequency of changing passwords, without the additional step of verifying the user's identity, may be less effective against sophisticated attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is multi-factor authentication (MFA)?
Why is email encryption not sufficient for securing access to shared resources?
How does frequent password changes compare to using MFA for security?
In the context of designing a highly available web service infrastructure that must remain operational during peak traffic times, which of the following techniques would BEST demonstrate an application of parallel processing concepts for capacity planning?
Applying database normalization to reduce data redundancy
Enforcing rate limiting on the web service API endpoints
Implementing a load balancer to distribute workload across multiple servers
Integrating a single sign-on (SSO) solution for user authentication
Answer Description
Load balancing effectively uses parallel processing by distributing incoming traffic across multiple servers, which not only manages the traffic surge during peak times but also provides redundancy in case one server fails. 'Database normalization' is a process used to optimize database design but does not directly apply to parallel processing for traffic management. 'Rate limiting' is used to control the traffic rate a single user or service can make to a web service but does not employ parallel processing to distribute workload. 'Single sign-on' (SSO) simplifies user authentication by using one set of login credentials for multiple services but is not related to the concept of parallel processing for handling increased load or capacity planning.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the role of a load balancer in a web service infrastructure?
How does parallel processing improve web service performance?
Why is database normalization not considered part of parallel processing?
During a period of international expansion, a company must revise its security governance documentation to ensure ongoing compliance with various regional laws and adherence to best practices. Which type of governance document is most critical to update and maintain to address these requirements?
Information Security Policies
Disaster Recovery Plans
Policies for the Use of Technology Resources
Business Continuity Documentation
Answer Description
While all listed documents play pivotal roles in a comprehensive security governance framework, Information Security Policies are crucial to defining the overall security strategy, essential for compliance with various regional, national, and global laws, and setting forth the rules and guidelines specific to the protection of the company's information assets. Updating the Information Security Policies will provide a foundation for the company's global security posture, ensuring that all other documents and practices align with these high-level policies and meet the regulatory requirements of each region in which the company operates.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Information Security Policies?
Why are Information Security Policies important for international compliance?
How do Information Security Policies relate to other governance documents like Disaster Recovery Plans?
When developing information security policies and controls for a multinational organization, which set of legal and regulatory requirements must be considered to ensure full compliance?
Only the national (federal) laws of the country where headquarters is located
Only the organization's local municipal or state laws
Only international treaties, ignoring local and national statutes
All applicable local, national, and international laws and regulations
Answer Description
Organizations need to account for the complete legal landscape that applies to their operations and data, including all relevant local, national, and international laws and regulations. Global requirements such as the EU GDPR have extraterritorial reach and can impose significant penalties-up to €20 million or 4 % of worldwide annual turnover-for non-compliance. Focusing only on local or national statutes, or exclusively on international treaties, would leave important obligations unmet and expose the organization to fines, sanctions, and reputational damage.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the EU GDPR, and why is it important for multinational organizations?
What are some examples of international laws that multinational organizations must consider?
How can organizations ensure compliance with multiple legal and regulatory frameworks globally?
You are a security analyst at a financial firm. An employee receives an instant message from a sender claiming to be from the IT department, asking them to click a link and enter their login credentials to update their account. The employee fell for the attack due to the message's specific nature, including correct names of an IT Department employee and the name of the target employee. What type of threat is most likely being attempted?
Vishing
Spear Phishing
Smishing
Whaling
Answer Description
The correct answer is Spear Phishing because it involves targeted attempts to deceive individuals into providing sensitive information. Vishing refers to voice-based phishing, Smishing involves SMS-based attacks, and Whaling targets high-profile executives specifically.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What makes Spear Phishing different from regular Phishing?
How do attackers gather the personal information used in Spear Phishing attacks?
What steps can organizations take to prevent Spear Phishing attacks?
An organization with remote employees requires a secure method for connecting to the internal network. Which solution should be used to ensure the highest level of security for data transmitted over public networks?
Secure Shell (SSH) tunneling for individual services
VPN with Internet Protocol Security (IPSec)
VPN with Point-to-Point Tunneling Protocol (PPTP)
Remote Desktop Protocol (RDP) with Network Level Authentication (NLA)
Answer Description
A VPN that implements IPSec provides a high level of security by establishing an encrypted tunnel between the VPN client and the VPN server, which protects the privacy and integrity of data transmitted over public networks. IPSec operates at the network layer, allowing it to secure all traffic that passes through the tunnel, making it the best option for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is IPSec, and how does it enhance VPN security?
Why is PPTP less secure compared to IPSec in VPNs?
How does VPN with IPSec compare to SSH tunneling or RDP for securing remote connections?
A security manager observes that the organization's IT environment and external threat-intelligence feeds have shown no significant changes during the past six months. Several executives propose skipping the annual tabletop exercise and document review for the incident response plan. Which of the following is the MOST compelling reason to proceed with the scheduled review and update?
Skipping the review conserves budget and staff time for higher-priority projects.
Regulatory and contractual obligations may require documented evidence of regular plan maintenance.
Because the environment is static, proactive changes are unnecessary until after a major breach takes place.
Regular reviews uncover otherwise hidden weaknesses and allow the plan to be improved before an actual incident occurs.
Answer Description
An incident response plan is a living document that must adapt to evolving threats and to lessons learned during drills and audits. Even when the environment appears static, undetected weaknesses or procedural gaps can persist. Regular reviews-through tabletop exercises, simulations, and document updates-surface these weaknesses so they can be corrected before a real incident occurs. Standards such as NIST SP 800-61 recommend at least annual reviews or reviews after any significant change or exercise. Therefore, uncovering hidden weaknesses is the strongest justification. The other options are either secondary considerations, false economies, or contradict best practice.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are tabletop exercises critical, even when no major changes are observed?
What is NIST SP 800-61, and how does it relate to incident response?
What are some common weaknesses uncovered during incident response plan reviews?
You are a penetration tester for a network security consulting company. You are currently on-site at a customer's premises and are doing your first analysis of the customer's network security. You check if they are using Wifi and find that they are using a deprecated protocol with known vulnerabilities. Which of the options is most likely being used?
805.99 b
WPA2
802.1X
WEP
Answer Description
Wired Equivalent Privacy (WEP) was a commonly used security protocol for encrypted wireless networks. It has been deprecated and is outdated with known vulnerabilities. WEP should not be used, instead a newer and more robust option like WPA2 should be implemented.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is WEP considered insecure?
What are the differences between WEP and WPA2?
What should you use instead of WEP for secure wireless networks?
A company wants to enhance its security by implementing an additional authentication factor to their current system that uses passwords. Which of the following would be the MOST secure biometric authentication method to add?
Installing key fob devices
Implementing fingerprint scanning
Using facial recognition technology
Setting up voice recognition systems
Answer Description
Adding fingerprint scanning as an additional factor is the MOST secure option among the choices given. It provides a high level of accuracy and is less subject to duplication or impersonation compared to other methods such as voice recognition. While facial recognition is secure, it can sometimes be influenced by changes in appearance or spoofed with high-quality images. Voice recognition, while convenient, can be less secure due to background noise, voice imitation, and recording attacks. Installing key fob devices is not a form of biometric authentication, as it is something you have, not something you are.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is fingerprint scanning considered more secure than other biometric methods?
What makes biometric authentication more secure compared to traditional passwords?
How does biometric authentication work in enhancing multifactor authentication (MFA)?
A network administrator receives reports that users are unable to access the company’s internal file server. The administrator verifies that the server is operational and the network infrastructure is functional. What is the BEST mitigation technique to ensure the users regain access?
Patch the file server’s operating system and applications to the latest versions.
Review and adjust the access control list (ACL) for the file server.
Enhance real-time monitoring of network traffic to the file server.
Decommission the current file server and migrate to a new one.
Answer Description
Reviewing and adjusting the access control list (ACL) is the most appropriate step when users are denied access to network resources, assuming there is no outage or malfunction of the actual resource or network. An ACL may have been incorrectly configured or updated, causing access issues. Examining and rectifying the ACL can restore proper access to authorized users. Patching, while important for security, would not directly address the immediate issue of access if the server and network are confirmed to be operational. Likewise, monitoring does not resolve current access issues, although it may help identify them. Finally, decommissioning the server would be counterintuitive if there's a need for its services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Access Control List (ACL)?
How can ACL misconfiguration cause access issues?
Why is patching not the best solution in this scenario?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.