CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A company wants to limit access to its systems to users connecting from certain countries to comply with regional regulations. Which of the following methods would BEST achieve this?
Deploying endpoint security software
Enforcing strong authentication protocols
Implementing geolocation-based access controls
Utilizing encryption for all data in transit
Answer Description
Implementing geolocation-based access controls allows the company to restrict system access based on the geographic location of the users. By analyzing the source IP addresses and determining their originating countries, the system can permit or deny access accordingly. This method ensures compliance with regional regulations by controlling access based on physical location. Enforcing strong authentication protocols enhances security but does not restrict access by location. Utilizing encryption for all data in transit protects data confidentiality but does not address access control based on geography. Deploying endpoint security software secures individual devices but does not prevent access from unauthorized countries.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are geolocation-based access controls?
How does an IP address help in determining a user's location?
What are some other methods to restrict access based on user location?
ABC Tech Corporation is considering outsourcing their customer support services to XYZ Support Inc. As part of the vetting process, which of the following is the most appropriate action to ensure due diligence and care is exercised in selecting a third-party vendor?
Review the marketing materials of XYZ Support Inc. for their success stories and client testimonials
Conduct an in-depth background check on XYZ Support Inc., which includes financial, reputational, and performance aspects
Delegate the decision to an intern, assuming that third-party vendors have similar capabilities
Choose XYZ Support Inc. because they offered the lowest bid, thereby saving on costs
Answer Description
Due diligence involves a comprehensive appraisal of a business or person's performance, legal obligations, technical competencies, and financial viability before entering into an agreement. Conducting an in-depth background check, which includes reviewing past performance, financial stability, and reputation in the industry, is the correct course of action to ensure due diligence and care is undertaken. This action helps ascertain XYZ Support Inc.’s ability to deliver on their commitments, and align with ABC Tech Corporation's requirements and standards.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What specific areas should be covered during the background check of XYZ Support Inc.?
What are the risks of choosing a vendor solely based on cost?
Why is it important to review a vendor's past performance as part of the background check?
An attacker infiltrates a company's network and steals customer credit card information. What is the likely motivation behind this attack?
Financial gain
Data exfiltration
Revenge
Espionage
Answer Description
Financial gain is the likely motivation because the attacker can use or sell the stolen credit card information for monetary profit. Espionage involves obtaining confidential information for strategic advantage, typically in a political or corporate context, which is not indicated here. Revenge would suggest the attacker has a personal vendetta against the company, but there is no such indication. Data exfiltration refers to the unauthorized transfer of data, but in this context, it's the means rather than the motivation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why do attackers seek financial gain through credit card theft?
What are other common methods attackers use to profit financially from stolen data?
What are common consequences for companies when customer credit card data is stolen?
You are working as a cybersecurity analyst for a 3rd party contractor. You have been brought in by an organization who believes they were hacked by a malicious actor. Their internal security team has hired you to determine the impact of the unauthorized access. At the time of the intrusion there were 5 servers online: DEV_APP_001, PRD_APP_002, PRD_DB_008, STG_DB_004 and FINANCE_009. What step should you take to begin the analysis?
Create a snapshot backup and then reformat each server
Begin hardening all servers immediately before the impact analysis starts
Create a new server running Kali Linux and make necessary firewall changes to allow it to access all the listed servers
Begin analyzing each server after prioritizing them based on the data stored on each server
Answer Description
You are hired to do an analysis on the systems to determine the impact of a malicious actor. Hardening and wiping the servers is outside of the scope of this analysis, but may be a recommended next step based on your findings. The logical step is to determine which servers are the most critical based on the data hosted on them, and begin analyzing them one-by-one in order of most important/critical data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to prioritize servers based on data importance?
What is the role of a cybersecurity analyst in an incident response?
Why is hardening servers not the first step in impact analysis?
Which state describes information that is being processed by an application?
Data at rest
Encrypted data
Data in use
Data in transit
Answer Description
The correct answer is 'Data in use'. Data in use refers to information that is currently being processed by an application, being in the immediate memory or CPU, and it is not at rest or in the process of being transmitted. 'Data at rest' describes data that is stored on a physical medium and is not actively being accessed or processed. 'Data in transit' refers to data that is moving through the network or telecommunication channels. 'Encrypted data' is a state that can apply to any of the three data states (at rest, in use, or in transit) and merely specifies that the data is encrypted, not that it is being processed by an application.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean when we say 'data in use'?
How does 'data at rest' differ from 'data in use'?
What are some security concerns for 'data in use'?
An organization is designing a high-availability web application that must handle fluctuating workloads and ensure minimal downtime during peak usage. Which of the following strategies BEST addresses the compute considerations for achieving high availability in this scenario?
Utilizing real-time data replication to a standby server
Implementing load balancing to distribute traffic across multiple servers
Deploying redundant power supplies for each server
Scheduling regular maintenance during off-peak hours
Answer Description
Implementing load balancing distributes incoming network traffic across multiple servers, effectively managing compute resources to handle fluctuating workloads. This improves both availability and scalability, ensuring the application remains responsive during peak usage times. While data replication to a standby server aids in recovery, it doesn't directly manage compute resources. Scheduling maintenance during off-peak hours minimizes disruption but doesn't address real-time workload management. Deploying redundant power supplies enhances power availability but doesn't handle compute load distribution.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is load balancing and how does it work?
What is high availability and why is it important?
What are redundant power supplies and how do they contribute to system reliability?
A security manager has placed conspicuous warning signs around the perimeter of a data center. The signs state, "No Trespassing - Violators Will Be Prosecuted." What type of security control does this action represent?
Deterrent
Compensating
Corrective
Preventive
Answer Description
Deterrent controls are designed to discourage potential attackers. Warning signs are a classic example as they inform individuals of the consequences of trespassing, aiming to deter the action. This is not a preventive control, as it does not physically stop an intruder (e.g., a fence or a lock). It is not a corrective control, which is used after an incident to limit damage (e.g., restoring from backups). It is also not a compensating control, which serves as an alternative when a primary control is not feasible.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are other examples of deterrent controls?
How do deterrent controls differ from preventive controls?
What role do legal repercussions play in deterrent controls?
A company's change management procedure requires that any modifications to the IT infrastructure undergo a review process. Before final approval, which document should primarily guide the decision on whether the change is in line with organizational security policies and standards?
Acceptable Use Policy (AUP)
Information Security Policies
Software Development Lifecycle (SDLC) document
Business Continuity Plan (BCP)
Answer Description
The Information Security Policies document should guide the decision-making process as it outlines the organization's overarching rules, expectations, and practices related to maintaining information security. It provides a framework for ensuring that changes comply with the standards necessary to protect the company's information assets. The Acceptable Use Policy (AUP) mainly concerns how individuals are permitted to use company resources. The Software Development Lifecycle (SDLC) policy is generally specific to the creation of software rather than change management. Meanwhile, the Business Continuity Plan (BCP) is designed to guide operations post-disruption and is not primarily used for decision-making in change management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are Information Security Policies and why are they important?
Can you explain the difference between an Acceptable Use Policy (AUP) and Information Security Policies?
What role does a Software Development Lifecycle (SDLC) document play in IT changes?
Your organization is handling sensitive government contracts and must ensure that information related to these projects is guarded against unauthorized physical access. In accordance with data classification policies, which of the following is the BEST way to handle such data?
Institute policies for secure disposal of printouts and storage media containing the data
Enable detailed logging of all access to the data for audit purposes
Encrypt all data and frequently change encryption keys
Store the data in a physically secure location and enforce strict access controls
Answer Description
Storing information with a 'Restricted' classification in a secure, access-controlled environment ensures that only authorized personnel with the necessary clearance or permissions have access to that data. Keep in mind the question is regarding physical access to the data. While encryption, logging, and secure disposal are important for the overall security posture, they do not inherently restrict access to the data to the appropriate individuals.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are access controls and why are they important?
What does it mean to store data in a physically secure location?
What are data classification policies and how do they impact data handling?
Firewalls operating at which OSI layer can make policy decisions based on the actual content of messages-such as specific URLs or the payload contained inside HTTP requests-rather than only on IP addresses or port numbers?
Layer 2 (Data link layer)
Layer 7 (Application layer)
Layer 4 (Transport layer)
Layer 3 (Network layer)
Answer Description
Firewalls that work at the application layer (layer 7) perform deep packet inspection. They can parse application-specific data like HTTP headers, URLs, and message bodies to allow or block traffic. Firewalls limited to the transport layer (layer 4) evaluate only header information such as IP addresses and TCP/UDP ports, while layers 3 and 2 concern routing and data-link functions and do not examine application content. Therefore, layer 7 is the only layer listed that provides content-aware filtering.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main functions of a Layer 7 firewall?
What is the difference between Layer 7 and Layer 4 firewalls?
What are some common threats that Layer 7 firewalls can mitigate?
A company is revising its security monitoring strategies to enhance incident detection and response. Their current system is primarily manual, resulting in delayed identification and inconsistent reporting of suspicious activities. Which of the following is the BEST method to improve their incident reporting and monitoring process?
Expanding the in-house security team
Implementing real-time automated monitoring and alerting systems
Increasing the frequency of manual security audits
Conducting more comprehensive employee training sessions
Answer Description
Automated monitoring and alerting systems provide real-time detection of security events, which significantly reduce response times to potential incidents. By setting thresholds and parameters for normal network behavior, these systems can promptly identify and report suspicious activities, enabling quicker remediation. While all other options may contribute to effective security practices, automated alerting will most directly address the current delays and inconsistencies in incident detection and reporting, leading to improved security posture.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are real-time automated monitoring and alerting systems?
How does automated monitoring differ from manual audits?
What are the benefits of using automated alerting in security?
An IT administrator is tasked with handling the offboarding process for an employee who has just been terminated. To minimize security risks, which of the following actions should be the administrator's IMMEDIATE priority?
Begin archiving the data from the employee's workstation.
Notify the rest of the team about the employee's departure.
Disable the employee's user accounts across all systems.
Retrieve all company-owned physical assets from the employee.
Answer Description
The correct answer is to disable the employee's user accounts across all systems. This is the most critical first step in the de-provisioning process to immediately revoke access and prevent any potential unauthorized actions by the former employee. While retrieving company assets, archiving data, and notifying the team are all important parts of the offboarding checklist, none are as time-sensitive as cutting off system access to protect company data and resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'de-provisioning' mean in the context of user accounts?
What are the risks associated with not de-provisioning user accounts immediately after termination?
What best practices should organizations follow for user account de-provisioning?
In a highly secure network environment with strict throughput requirements, which device attribute would MOST likely be preferred when implementing a security control intended to scrutinize traffic without causing significant latency?
An active security device configured to make real-time decisions
A security device configured to fail-open to reduce latency
A tap/monitor setup that passively observes traffic
An inline security device configured to interact with traffic
Answer Description
A tap/monitor setup is preferred in scenarios where monitoring is essential, but it is crucial not to introduce latency or a single point of failure within the network traffic flow. An inline device would actively interact with traffic, potentially introducing latency, which is undesirable in strict throughput environments. Active devices are designed to intervene and could affect performance, whereas fail-open implies a state during failure, which is not relevant to the operational performance during normal conditions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a tap/monitor setup?
What are the differences between inline and passive security devices?
What does it mean for a device to fail-open, and how does it affect latency?
An organization's web server configuration has been altered without authorization, leading to a security breach. The security team decides to implement a system that tracks all changes to the configuration files, maintains a history of these changes, and allows them to revert to any previous version if necessary. Which of the following solutions will BEST meet these requirements?
Use file integrity monitoring tools on configuration files
Schedule regular backups of configuration files
Apply strict access controls to configuration files
Implement a version control system for configuration files
Answer Description
Implementing a version control system allows the organization to track every change made to configuration files, maintain a history of modifications, and revert to any previous version when needed. This meets all the requirements stated. Regular backups (Option B) allow restoration of files but may not provide detailed change tracking or the ability to view the history of changes. Strict access controls (Option C) can prevent unauthorized access but do not track changes made by authorized users. File integrity monitoring (Option D) can detect changes but doesn't provide version history or the ability to revert changes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system?
How does a version control system differ from backups?
What are the benefits of file integrity monitoring tools?
Which risk management strategy is the only one that will completely eliminate the risk associated with an activity?
Mitigation
Transference
Acceptance
Avoidance
Answer Description
Risk avoidance involves not preforming an activity to avoid the associated risk. Not preforming the activity means the risk from that activity is zero. Each other method still leaves some level of risk.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is risk avoidance in risk management?
What are the other risk management strategies?
Why is risk avoidance considered the only way to completely eliminate risk?
Within a secure data center, engineers have enclosed an entire row of server racks inside a conductive mesh that blocks both incoming and outgoing electromagnetic fields. What is the primary security purpose of deploying this enclosure?
Physically deter intruders by acting as a hardened barrier that delays forced entry
Prevent electromagnetic eavesdropping and data leakage by blocking emissions
Provide redundant environmental controls such as precise humidity and temperature regulation
Detect unauthorized access attempts by monitoring ambient radio-frequency signals
Answer Description
The conductive enclosure is a Faraday cage. By blocking electromagnetic emissions, it prevents sensitive signals from being intercepted (TEMPEST/eavesdropping) and shields the equipment from external electromagnetic interference. This makes it a preventive physical control aimed at protecting the confidentiality and integrity of information-not a mechanism for detecting intrusions, regulating environmental conditions, or physically deterring forced entry.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Faraday cage and how does it work?
What are some potential threats that EMI poses to data security?
What are other physical security measures for data centers apart from EMI shielding?
Which of the following best describes the concept of high availability in the context of security architecture?
Designing systems in a way that reduces their energy consumption to ensure longer operating times
Ensuring operational performance for a higher than normal period by means of redundancy and failover mechanisms
The ability of a system to handle increased loads by distributing tasks across multiple servers
The duplication of critical components of a system with the intention of increasing reliability of the system
Answer Description
High availability refers to a system's design that aims to ensure an agreed level of operational performance, typically uptime, for a higher than normal period. This is achieved through redundancy and failover mechanisms that allow a system to remain functional even if some of its components fail. Scalability refers to the ability of a system to handle growth, which is important but doesn't specifically relate to uptime. Redundancy is the duplication of components and is part of achieving high availability, but on its own, it does not describe the entire concept. Power efficiency is related to energy consumption and not directly to maintaining uptime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are redundancy and failover mechanisms?
Why is high availability important in security architecture?
How does high availability differ from scalability?
A security analyst needs to investigate a potential data breach that is suspected to have occurred over the past week. The investigation requires correlating log data from firewalls, servers, and intrusion detection systems to identify suspicious patterns and trace the timeline of events. Which of the following tools is BEST suited for this type of historical analysis and data correlation?
A packet capture utility
A system vulnerability scanner
A real-time network performance monitor
A security operations dashboard
Answer Description
The correct answer is a security operations dashboard. These dashboards, typically integrated with a Security Information and Event Management (SIEM) system, are specifically designed to aggregate, correlate, and visualize log data from numerous sources over time. This makes them the ideal tool for historical analysis and identifying trends or patterns indicative of a breach. A real-time network performance monitor focuses on current bandwidth and latency, not historical log correlation. A packet capture utility provides deep, low-level data but is cumbersome for analyzing long-term, aggregated trends across multiple systems. A system vulnerability scanner is used to identify unpatched systems and misconfigurations, not for analyzing event logs to investigate an active or past incident.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What types of data can security operation dashboards integrate?
How do historical analyses contribute to cybersecurity?
What is the role of SIEM in security operation dashboards?
A security analyst notices a series of requests on a company's web server logs. Each request tries to retrieve different paths that are not commonly accessed, and all the requests come from one external network address within a brief time window. Which of the following best describes the intent of these requests?
A misconfigured automatic task on the server
Execution of client-side scripts from a user's web browser
Reconnaissance by an attacker attempting to discover unlinked content or vulnerabilities
A user navigating the company's public website pages
Answer Description
The pattern described suggests a reconnaissance action, possibly an attacker performing a directory traversal to uncover hidden files, directories, or exploit potential vulnerabilities. Normal browsing behavior usually involves fewer requests and focuses on typical, user-facing paths. Client-side scripting refers to scripts running in a user's browser, generally not visible on server logs. A misconfigured scheduled task might repeatedly access the same path, not different uncommon ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is reconnaissance in the context of cybersecurity?
What is directory traversal and why is it a concern?
How can organizations detect and mitigate reconnaissance activities?
During a security awareness training session, you want to ensure employees are equipped to identify fraudulent emails attempting to obtain sensitive company data by impersonating a trusted source. Which type of security threat should the training primarily focus on?
Tailgating
Vishing
Spear phishing
Phishing campaigns
Answer Description
The correct answer is 'Phishing campaigns' because they involve the use of communications, typically emails, that attempt to fraudulently obtain sensitive information by impersonating a trusted organization or individual. 'Spear phishing' is a more targeted version of phishing, and while it is related, the question is asking about the broader term. 'Vishing' refers to voice call scams, and 'Tailgating' is a physical security breach method, which does not fit the context of identifying fraudulent emails.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What exactly are phishing campaigns?
What distinguishes spear phishing from regular phishing?
What is vishing and how is it different from phishing?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.