CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A security analyst is reviewing authentication logs and notices a high volume of failed login attempts from a single IP address. The attempts target many different user accounts, but all use a small set of common passwords like 'Password123' and 'Winter2025'. This 'low-and-slow' method appears designed to avoid individual account lockouts. Which type of password attack does this activity indicate?
Dictionary attack
Plaintext/Unencrypted
Rainbow table
Spraying
Answer Description
Password spraying is a type of brute-force attack where an attacker attempts to access a large number of accounts with a few commonly used passwords. Unlike a traditional brute-force attack that targets a single account with many passwords, spraying targets many accounts with few passwords to prevent triggering account lockout policies. A dictionary attack is different as it typically uses a large list of passwords against a single account. A rainbow table attack is used to crack password hashes that have already been stolen, not for online authentication attempts. 'Plaintext/Unencrypted' refers to the insecure state of a password, not an attack method.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do attackers use password spraying instead of traditional brute-force attacks?
What are some common security measures to defend against password spraying attacks?
How does password spraying differ from a dictionary attack?
A network administrator is configuring remote access to the company's servers and wants to use a secure protocol. Which port should they select to align with standard secure practices?
Port 443
Port 22
Port 23
Port 80
Answer Description
Port 22 is designated for Secure Shell (SSH), a protocol that provides encrypted remote access. Using the standard port ensures compatibility and leverages established security measures. Ports like 23 (Telnet) are insecure, while ports 80 and 443 are typically used for web traffic.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is SSH considered secure compared to Telnet?
What is the role of port numbers in network protocols?
How does SSH enhance remote server management?
Which action best exemplifies the mitigation of a security risk within an organization's risk management strategy?
Establishing additional access controls to safeguard sensitive information.
Acknowledging the existence of a security risk and choosing not to take corrective actions.
Deciding to stop all activities that are associated with a high level of risk to avoid it completely.
Purchasing an insurance policy to transfer the risk associated with potential data breaches.
Answer Description
Mitigation refers to the implementation of measures to reduce the impact of a threat or to reduce the likelihood of its occurrence. Establishing additional access controls to safeguard sensitive information makes it more difficult for unauthorized users to access this information, thus reducing the potential impact of a data breach. On the other hand, transferring the risk involves shifting the responsibility to another entity, such as through insurance. Avoiding the risk would mean completely eliminating the threat, which can be unrealistic for some risks, and accepting the risk would indicate no further actions to decrease its impact.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are access controls, and how do they mitigate risks?
How does risk mitigation differ from risk transference or acceptance?
Why might organizations choose mitigation over risk avoidance?
During an incident response, an organization has identified an infected workstation that is part of a botnet and is communicating with external command and control servers. What is the BEST immediate action to contain this threat?
Isolate the infected workstation from the network
Perform a vulnerability scan to identify the infected workstation
Change access controls on the infected workstation
Capture network traffic to analyze the communication with the command and control servers
Answer Description
Isolating the workstation from the network is the BEST immediate action to thwart the ongoing threat, as it prevents the infected system from communicating with the command and control servers and stops further spread of the infection. Changing access controls might not be effective if the infection is propagating in other ways, and conducting a vulnerability scan or capturing network traffic does not immediately contain the threat.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a botnet and how does it work?
Why is isolating the infected workstation the best immediate action?
What tools or methods can be used to isolate a workstation from a network?
Your company is expanding its operations to a new region with strict data protection laws that differ significantly from those where your headquarters is located. What is the most important first step your security governance team should take to ensure compliance with the new region's legal requirements?
Review and align the security policies with the local/regional legal requirements.
Apply the same security policies from the headquarters to the new region's operations without modification.
Mandate that all employees complete a new security awareness training immediately.
Implement an advanced encryption protocol to secure all data in transit and at rest within the new region.
Answer Description
The correct answer is 'Review and align the security policies with the local/regional legal requirements.' When entering a new region, an organization must ensure that its security policies comply with local laws to avoid legal consequences and protect the company's reputation. Conducting a thorough review of the new region's legal requirements and aligning the organization's security policies accordingly is the most prudent initial step.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to review and align security policies with local laws when expanding to a new region?
How can an organization determine the legal requirements of a new region?
What are the consequences of applying security policies without modification in a new region?
A financial services company discovers that an employee's computer has been transmitting sensitive client data to an external server. The IT team suspects malware is involved and has identified a process that seems to be masquerading as a valid application. Which type of malware is designed to perform unauthorized actions while disguising itself as legitimate software?
Trojan
Ransomware
Worm
Virus
Answer Description
A Trojan is the correct answer because it disguises itself as legitimate software to carry out unauthorized actions, such as data exfiltration. Viruses attach to files and spread, worms replicate over networks, and ransomware encrypts data for ransom, none of which specifically disguise as legitimate programs to execute covert actions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a Trojan differ from a virus?
What techniques do Trojans use to appear legitimate?
How can organizations protect against Trojans?
Which of the following is the most direct benefit of providing regular security awareness training to all employees in an organization?
It removes the need for technical security controls such as firewalls.
It completely prevents all forms of social engineering attacks without further action.
It increases employee compliance with corporate security policies and procedures.
It shifts all information-security responsibility to the IT department alone.
Answer Description
Security awareness training educates personnel about corporate security policies, common threats, and safe practices. By making employees aware of their responsibilities and the consequences of non-compliance, organizations see higher adherence to security policies and procedures. Training does not eliminate the need for technical controls, guarantee perfect security, or shift responsibility to a single department; instead, it complements other controls by improving human behavior and reducing policy violations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is regular security awareness training important for organizations?
What are some examples of social engineering attacks covered in security training?
How does security awareness training complement technical controls like firewalls?
During a post-implementation review, the security team notes that the new e-commerce platform must continue to meet performance and security requirements even if user traffic doubles over the next year. Which design characteristic best describes this requirement?
Adaptability
Durability
Flexibility
Scalability
Answer Description
Scalability is the property of a system, network, or process that enables it to handle a growing amount of work or be enlarged to accommodate that growth without degrading performance or security. Adaptability and flexibility focus on a system's ability to change functionality, while durability concerns its resistance to failure; none of these directly address workload growth.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key factors that make a system scalable?
How does scalability differ from flexibility in a system?
Why is scalability important for security in a growing system?
Which of the options below is typically advisory and not mandatory to adhere to?
Guideline
Procedure
Standard
Policy
Answer Description
A guideline is considered a recommendation/best practice and is not considered mandatory to follow.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a guideline and a policy?
How does a guideline differ from a procedure?
Why are guidelines important in security frameworks?
When establishing an effective security governance framework for an organization, which of the following is MOST essential to ensure alignment with business objectives and risk management strategies?
Information security policies
Recovery Point Objective (RPO) metrics
Annualized Rate of Occurrence (ARO) calculations
Password complexity standards
Answer Description
Information security policies are most essential for establishing a security governance framework that aligns with business objectives and risk management strategies. Policies are high-level documents that set the overall direction for security, implement controls across the organization in line with its risk appetite, and provide a formal framework for staff to understand their responsibilities. The other options are more specific elements that are typically defined and guided by policies. Password complexity standards are specific rules that enforce a broader access control policy. Annualized Rate of Occurrence (ARO) and Recovery Point Objective (RPO) are specific metrics used within risk analysis and business impact analysis, respectively, which are processes governed by high-level security policies.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are information security policies?
How do Annualized Rate of Occurrence (ARO) calculations relate to risk management?
What is the significance of Recovery Point Objective (RPO) in security planning?
An IT security manager wants to ensure that users can employ complex and unique passwords for each of their accounts without the need to remember each one individually. Which of the following solutions would best meet this requirement?
Implementing a password manager application
Enforcing strict password complexity and expiration policies
Deploying single sign-on authentication for all services
Implementing biometric authentication methods
Answer Description
Implementing a password manager application allows users to securely store and manage complex and unique passwords for all their accounts. This encourages the use of strong, unique passwords without the burden of memorization. Enforcing strict password policies may lead to password reuse or users writing down passwords. Single sign-on (SSO) reduces the number of passwords but does not promote unique passwords for each service. Implementing biometric authentication enhances security but doesn't address the management of multiple complex passwords.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does a password manager work?
Why is single sign-on (SSO) not ideal for unique passwords?
What are some risks of enforcing strict password policies without other tools?
A security analyst is tasked with enhancing the organization's proactive defense capabilities by identifying new and evolving attack methodologies before they are widely used. Which of the following would be the MOST effective practice for this purpose?
Perform a comprehensive penetration test on an annual basis.
Conduct regular internal vulnerability scans on all network assets.
Subscribe to and analyze threat intelligence feeds.
Enforce a more stringent password complexity and rotation policy.
Answer Description
The correct answer is to subscribe to and analyze threat intelligence feeds. Threat intelligence feeds provide up-to-date information on emerging threats, new attack vectors, malware, and adversary tactics, techniques, and procedures (TTPs). This allows security professionals to proactively adjust defenses against new threats. While the other options are valid security practices, they are not the most effective for identifying emerging threats. Regular vulnerability scanning is crucial for finding known vulnerabilities in the current environment but is reactive to what is already known. Enforcing stronger password policies is a fundamental security control but does not provide insight into new attack methods. Annual penetration testing validates existing defenses against known attack types but is a point-in-time assessment and less effective for continuous monitoring of new, evolving threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are threat intelligence feeds?
How do threat intelligence feeds differ from vulnerability scans?
Why is real-time monitoring of new threats important?
A system administrator has been tasked with securing data at rest for a company's document storage server, ensuring maximum confidentiality. Which of the following solutions would be the MOST appropriate to accomplish this task?
Ensure Secure Socket Layer (SSL)/Transport Layer Security (TLS) is enabled on the server.
Implement full disk encryption on the document storage server drive.
Utilize a VPN with robust encryption for accessing documents remotely.
Encrypt each document individually with a unique key.
Answer Description
Full disk encryption (FDE) is the correct choice as it provides comprehensive encryption of all data on the storage medium, ensuring that without the appropriate decryption key, no data can be read, regardless of the system state or whether the storage device is transferred to another machine. Encrypting individual files, while useful, does not offer the same level of protection if an attacker gains access to the underlying file system. Encrypting data using a VPN only secures data in transit, not at rest. SSL/TLS also protects data in transit and does not apply to data at rest.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is full disk encryption (FDE) and how does it work?
Why is full disk encryption more secure than encrypting files individually?
What is the difference between data at rest and data in transit, and how do encryption methods differ for each?
A company's leadership has mandated the implementation of stronger controls around password management to improve security posture. As part of this initiative, the CISO is revising the company's password policy. Which of the following changes to the password policy BEST aligns with effective security governance practices?
Mandating biometric authentication in addition to the password for all user accounts.
Implementing a passphrase policy with a mix of upper and lower case letters, numbers, and symbols.
Increasing the mandatory password change frequency to every 30 days.
Disabling the account lockout feature after several incorrect password attempts.
Answer Description
The use of a passphrase with complexity requirements helps in balancing security with usability. Passphrases are generally longer than traditional passwords and can incorporate complexity through the use of mixed-case letters, numbers, and symbols, making them more resistant to brute force attacks. The phrase structure also aids in memorability, potentially reducing the likelihood of password sharing and reuse. While requiring biometrics adds a level of security, it is not specifically a password policy change. Frequent password changes can lead to users selecting less secure passwords due to fatigue. Disabling account lockout negates a vital security control against brute force attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are passphrases considered stronger than traditional passwords?
How does frequent password expiration negatively impact security?
What is the importance of an account lockout feature?
As a security administrator, you have implemented a new company policy to review firewall logs daily. During one review, you notice numerous login attempts from foreign IP addresses taking place outside of business hours. Based on this information, which of the following actions should be prioritized to enhance network security?
Update the firmware on the firewall to the latest version
Configure account lockout thresholds to prevent brute-force attacks
Conduct an additional security-awareness training session focusing on foreign cyber threats
Review the latest operating-system patches for all company servers
Answer Description
Although several measures could improve the organization's overall security posture, the activity in the logs indicates a likely brute-force or credential-stuffing attack against user accounts. Establishing appropriate account lockout thresholds restricts the number of consecutive failed authentication attempts, effectively limiting an attacker's ability to guess valid credentials. Routine tasks such as updating firewall firmware and applying operating-system patches improve resilience against known vulnerabilities but do not directly curtail the observed login attempts. Additional user security-awareness training is valuable but likewise does nothing to stop automated, external password-guessing activity. Therefore, configuring and enforcing account lockout thresholds is the most immediate and relevant mitigation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a brute-force attack?
How do account lockout thresholds help mitigate brute-force attacks?
What are other methods to mitigate credential-stuffing attacks?
Which of the following is an example of a possession factor that could be used for multi-factor authentication?
A password
Eye color
A mobile app authorization request
A hardware authentication token
Answer Description
A possession factor is an authentication method based on something the user physically possesses. A hardware authentication token is a small physical device that can generate a secure login code or house digital certificates and is carried by the user to provide a possession factor for authentication. Eye color is a trait, not something possessed. A password is something the user knows, and a mobile app authorization request, while delivered to a device the user possesses, by itself is not considered a possession factor until accepted and is not inherently a physical item.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is multi-factor authentication (MFA)?
How does a hardware authentication token work?
Why isn't a mobile app authorization request considered a possession factor by itself?
An organization utilizes virtualization to run multiple Virtual Machines on a single physical server for different departments. Recently, it was discovered that confidential data from one Virtual Machine was accessible to users on another Virtual Machine due to inadequate resource sanitization. Which of the following mitigates this virtualization vulnerability?
Disable hyper-threading on physical CPUs to prevent side-channel attacks
Install antivirus software on the host to detect malware within virtual machines
Sanitize resources when deallocating virtual machines
Isolate virtual machines in separate VLANs to prevent network sniffing
Answer Description
Sanitizing resources when deallocating virtual machines addresses resource reuse vulnerabilities. This process ensures that any residual data in memory and storage is securely erased before resources are reassigned to other virtual machines, preventing unauthorized access to sensitive information.
Disabling hyper-threading on physical CPUs can help mitigate certain side-channel attacks but does not address data leakage due to resource reuse.
Isolating virtual machines in separate VLANs protects against network-based threats like sniffing but does not prevent data exposure through shared physical resources.
Installing antivirus software on the host enhances malware detection but does not prevent data leakage caused by improper resource sanitization in virtualization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does resource sanitization mean in virtualization?
How does improper deallocation of resources lead to data leakage?
What role does a hypervisor play in managing virtual machine resources?
Your company is in the process of expanding its operations into a new country. As the security architect, you are tasked with ensuring compliance with data handling regulations specific to the new location. Which of the following strategies should be your primary focus to maintain adherence to data sovereignty requirements concerning the storage and processing of customer data?
Regularly back up customer data to an offshore data center to ensure its availability.
Store and process all customer data within the same country where your customers reside.
Encrypt all customer data to ensure its confidentiality, regardless of its geographic location.
Institute robust access controls for all customer data irrespective of its storage location.
Answer Description
Data sovereignty refers to the legal requirements imposed on data based on the country or region where it is stored or processed. Ensuring that all customer data is stored and processed within the same country where the customers reside is essential to comply with data sovereignty laws, which may vary significantly from one jurisdiction to another.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is data sovereignty?
Why is storing and processing data in the customer's country important for compliance?
How do data sovereignty laws differ from data privacy laws?
Your employer has several thousand internal users all who need to access the internet on a daily basis to complete their work. What technology should be used to mask the internal IP addresses of these users and allow access to the internet through shared public IP addresses?
DMZ
DNS
NAT
Router
Answer Description
Network Address Translation (NAT) allows many devices to share an IP when accessing another network. Most commonly it is used to allow internal devices to share public IP addresses when accessing the internet. Benefits of NAT include minimizing the number of public IP addresses required (they cost money and for IPv4 there is a limited number available) as well as masking the origin of the request which provides security benefits. Generally NAT is used on a router or firewall.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is NAT and how does it work?
What are the differences between NAT and a DMZ?
Why is NAT important in IPv4 networks, and how does it differ from IPv6?
An organization has implemented an aggressive patch-management program and deploys vendor updates within 24 hours of release. Which statement best describes the level of protection this practice provides against malware?
It completely eliminates the risk posed by all malware, including those that exploit zero-day vulnerabilities.
It significantly reduces exposure to malware that exploit known flaws, but additional controls are still needed to defend against zero-day and social-engineering attacks.
It automatically blocks malicious email attachments because the operating system files are up to date.
It makes endpoint detection and response (EDR) tools unnecessary because patched systems cannot execute malicious code.
Answer Description
Applying patches quickly closes known software vulnerabilities and therefore blocks many exploits used by commodity malware. It does not guarantee immunity from new or zero-day threats, nor does it stop malware delivered through phishing, malicious macros, or other techniques that do not rely on an unpatched vulnerability. A layered defense that includes security awareness, EDR, email filtering, and least-privilege controls is still required.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are zero-day vulnerabilities, and why do patches not protect against them?
Why is a layered defense important even when patches are deployed quickly?
How do social-engineering attacks bypass patched systems?
Cool beans!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.