CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following options represents a common practice in the hardening of computing systems to enhance security?
Disabling the firewall on all servers
Allowing unrestricted root access to all users for convenience
Using vendor-supplied default passwords for all devices
Updating systems regularly
Answer Description
Updating systems regularly is a hardening technique that involves applying patches to operating systems and applications to protect against known vulnerabilities. Disabling firewalls or allowing root access would decrease system security, while using default passwords is against security best practices as they are often easily guessable.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is regularly updating systems considered a best practice for security?
What is the risk of using vendor-supplied default passwords on devices?
How does disabling a firewall decrease system security?
Which containment technique would be the best response when a system is believed to be infected with malware?
Isolate the affected systems
Determine the attack vector and disable it
Immediately segment the network into the smallest possible groups
Propagation
Answer Description
Containment techniques are options for limiting the spread of malware after it has been discovered on a network. The best response is to isolate any systems that are infected or believed to be infected so they cannot propagate the malware to other systems. From the security and IT teams can begin determining the impact and remediation options.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is isolating the affected systems considered the best containment method for malware?
What steps should be taken after a system is isolated due to suspected malware?
How does malware propagation work, and why is it important to prevent it early?
An organization allows users to grant access permissions to their own files, enabling other users to read or modify these files based on the owner's decision. Which access control model does this scenario best illustrate?
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Role-Based Access Control (RBAC)
Answer Description
Discretionary Access Control (DAC) allows resource owners to determine who can access their resources. In this scenario, users are empowered to set permissions on their own files, which aligns with the principles of DAC. The other access control models, such as MAC, RBAC, and ABAC, involve more centralized or role-based permission management.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Discretionary Access Control (DAC)?
How does DAC differ from Mandatory Access Control (MAC)?
Can you explain an example of DAC in action?
Your organization is rolling out a new line of laptops to employees who handle sensitive data. These devices will be storing encryption keys, digital certificates, and passwords. The IT department is required to ensure that the keys used for disk encryption are stored in a way that is resistant to tampering and can provide platform integrity verification. What embedded solution on the laptops should be utilized to achieve this level of security?
Implement a Secure Enclave within the laptop's central processing unit.
Integrate a separate Hardware Security Module (HSM) for each laptop.
Use the Trusted Platform Module (TPM) on the laptops.
Apply a Key Management System for all user credentials.
Answer Description
The correct answer is 'Use the Trusted Platform Module (TPM) on the laptops.' A TPM is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication. The keys stored in the TPM are used for different security applications, such as disk encryption, which is critical for securing sensitive data on employee laptops. Moreover, the TPM can provide platform integrity verification, enhancing the overall security posture. While an HSM and Secure Enclave can offer secure storage for keys and perform cryptographic operations, they are typically external devices or isolated areas within a CPU, not embedded solutions specifically tailored for endpoint devices like laptops. A Key Management System is more of an overarching system to manage cryptographic keys throughout their lifecycle and does not provide the hardware-level storage necessary for this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Trusted Platform Module (TPM)?
How does TPM ensure platform integrity verification?
How is TPM different from a Hardware Security Module (HSM)?
Which form of access control is specifically designed to adapt in real-time to the perceived threat level, improving the security stance by continuously evaluating the risk and context associated with user access requests?
Adaptive Policy-driven access control
Role-based access control (RBAC)
Discretionary access control (DAC)
Mandatory access control (MAC)
Answer Description
Adaptive Policy-driven access control, also known as risk-adaptive access control, is correct because it incorporates real-time risk assessments based on context, such as user behavior, device security status, and data sensitivity, to adapt access permissions dynamically, thereby limiting the scope of threats by granting access based on policies that respond to perceived risk levels. While Role-based access control (RBAC) is statically designed based on predefined roles and Discretionary access control (DAC) is based on the resource owner's discretion, neither adapts dynamically to changing threat landscapes. Mandatory access control (MAC) is policy-based but not adaptive to real-time risks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does Adaptive Policy-driven access control differ from RBAC?
What contextual factors are commonly evaluated in Adaptive Policy-driven access control?
Why is real-time risk assessment important in Adaptive Policy-driven access control?
A multinational corporation with operations in several countries is working to ensure compliance with global data protection regulations. What is the most appropriate action for the company to take in order to maintain compliance with the diverse set of regulations concerning user data privacy?
Create a data retention policy that focuses on adhering to the least restrictive data protection standards to ensure ease of data flow.
Set up an external compliance team dedicated to each region to handle region-specific data privacy laws.
Establish a data governance framework that complies with the highest standard among the international data protection regulations.
Delegate the responsibility for compliance with data protection laws to the IT department of each local office.
Answer Description
Establishing a comprehensive data governance framework that is built to comply with the highest standard among international data protection regulations ensures that the organization operates above the baseline requirements of all jurisdictions it operates in. This approach is usually more efficient than attempting to comply with each set of local regulations separately and minimizes the risk of non-compliance. Marking the setup of an external compliance team as the correct answer would be inappropriate because it does not necessarily ensure compliance with global data protection standards. Creating a data retention policy focusing on the least restrictive standards does not ensure compliance with more stringent regulations in other jurisdictions. Lastly, leaving the compliance decision to local IT departments may result in a fragmented and inconsistent approach to data protection that could lead to non-compliance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a data governance framework?
Why is it better to comply with the highest standards of data protection regulations?
How does data privacy regulation differ across jurisdictions?
A company has been monitoring the performance of its network routers over a 2-year period and observed the following outages: Year 1 experienced 4 outages, totaling 16 hours, and Year 2 experienced 2 outages, totaling 12 hours. Assuming the network was operational for a total of 17,520 hours across both years, what is the Mean Time Between Failures (MTBF) for the network routers?
2,920 hours
2,500 hours
3,004 hours
2,752 hours
Answer Description
To calculate MTBF, divide the total operational time by the total number of failures. The total operational time over the 2-year period is 17,520 hours, and there were 4+2=6 outages. Therefore, the MTBF is 17,520 hours / 6 outages = 2,920 hours. Accurate calculation of MTBF is essential for gauging the reliability of equipment and scheduling maintenance to minimize downtime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does MTBF mean in network reliability calculations?
Why is calculating MTBF important for maintenance planning?
What other metrics complement MTBF in system reliability analysis?
A company wants to reduce the number of login IDs and passwords their employees need to remember to access various company resources. Which authentication scheme should a security administrator recommend to achieve this?
SSO
802.1X
RADIUS
TACACS+
Answer Description
Single sign-on (SSO) is an authentication scheme that allows a user to use a single set of credentials (like a username and password) to access multiple different applications and resources. This directly addresses the company's goal of reducing the number of logins employees must manage.
- RADIUS and TACACS+ are AAA (Authentication, Authorization, and Accounting) protocols, primarily used for centralizing authentication for network access (like Wi-Fi or VPNs) or network device administration, respectively. They do not provide the seamless single-login experience across various applications that SSO offers.
- 802.1X is a port-based network access control (PNAC) standard used to authenticate devices before they are allowed to connect to a network. It is not used for authenticating users to applications.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main benefits of using SSO in an organization?
How does SSO differ from protocols like RADIUS and TACACS+?
What role does 802.1X play in a network, and how is it different from SSO?
A medium-sized healthcare organization has performed a risk analysis and discovered that the potential financial impact of breaches to patient data is very high. The organization has a limited budget and cannot implement all the recommended security controls. The Chief Information Security Officer (CISO) must decide which risks to prioritize. Which risk management strategy should the CISO adopt for those risks that cannot be fully mitigated due to budget constraints?
Mitigate the risks by implementing all recommended security controls despite the budget.
Transfer the risks to a cyber insurance company.
Avoid the risks by ceasing all operations that involve handling patient data.
Accept the risks and document the decision and the rationale behind it.
Answer Description
The CISO should opt to accept the risks that cannot be fully mitigated due to budgetary constraints. This involves acknowledging that the risks exist, understanding the potential impact, and making a conscious decision not to take direct action to address them. Other strategies like transferring, avoiding, or mitigating the risks may be inappropriate or too costly in this situation compared to the value of the assets being protected.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean to accept a risk in risk management?
Why might transferring a risk not always be the best option in cybersecurity?
What is the difference between accepting and avoiding a risk?
An organization wants to implement a system where users authenticate once and gain access to multiple related systems without re-entering credentials. What authentication method should they deploy?
Single Sign-On
Federated Identity Management
Biometric Authentication
Multifactor Authentication
Answer Description
Single Sign-On (SSO) is the appropriate authentication method because it enables users to authenticate once and gain access to multiple applications without re-entering credentials. This streamlines the login process and enhances user experience while maintaining security. Multifactor Authentication (MFA) increases security by requiring multiple authentication factors but does not allow access to multiple systems without additional logins. Federated Identity Management allows sharing of identity information across different organizations or domains, which may not be applicable here. Biometric Authentication uses unique physical traits for identity verification but doesn't provide access to multiple systems with a single authentication.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between Single Sign-On (SSO) and Federated Identity Management (FIM)?
How does Single Sign-On (SSO) enhance security compared to traditional login systems?
What technologies or protocols are commonly used to implement SSO?
A security administrator is tasked with ensuring that all servers in the organization adhere to a standardized and secure configuration as determined by the organization's security team. Which of the following should the administrator implement to achieve this objective most effectively?
Enforcing strict password policies
Using intrusion detection systems (IDS)
Deploying a security content automation protocol (SCAP) tool
Applying configuration management benchmarks
Answer Description
Implementing security benchmarks provides standardized guidelines for configuring systems securely, ensuring consistency and reducing vulnerabilities across all servers. This approach aligns with best practices for establishing and maintaining secure baselines.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are configuration management benchmarks and why are they important?
How is a Security Content Automation Protocol (SCAP) tool different from applying benchmarks?
Why wouldn’t using intrusion detection systems (IDS) or enforcing password policies achieve the same objective?
Which device specializes in the secure generation, storage, and management of encryption keys?
Hardware appliance for encryption key stewardship
Processor security feature for sensitive data protection
Network Attached Storage
Biometric Reader
Answer Description
A dedicated hardware appliance known as a Hardware Security Module specializes in the secure generation, storage, and management of encryption keys. It is used to enhance security by offloading these sensitive operations from less secure general-purpose servers. On the other hand, a Secure Enclave is a subset of a processor used to protect sensitive data but does not primarily focus on key management. Biometric Readers are used for authentication purposes based on physical characteristics and are unrelated to encryption key management. Network Attached Storage devices are used for data storage and also do not specialize in managing encryption keys.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Hardware Security Module (HSM)?
How does an HSM differ from a Secure Enclave?
Why are HSMs preferred over software-based key management?
A company is drafting a security policy for its BYOD program. The draft states that employees' personal mobile devices must be secured using only the device's built-in biometric authentication, such as a fingerprint or face scan. A security analyst is asked to review the policy. Which of the following is the BEST reason for the analyst to recommend against this policy?
Biometric authentication is a single factor that can be bypassed or spoofed, leaving the device vulnerable.
Relying on biometrics leads to high battery consumption on mobile devices.
Biometric authentication is not supported by most mobile device management (MDM) platforms.
Users often find biometric authentication less convenient than a traditional password.
Answer Description
While biometric authentication provides a convenient and personal security layer, it should not be the sole method of protection. Biometric systems can be bypassed or spoofed using various techniques. Furthermore, a single authentication factor is inherently weaker than a multi-factor approach. Therefore, the best practice is to require biometrics in conjunction with another factor, like a strong PIN or password, as part of a multi-factor authentication (MFA) strategy to provide defense-in-depth.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main vulnerabilities of biometric authentication?
Why is multi-factor authentication stronger than single-factor authentication?
How does built-in biometric authentication interact with mobile device management (MDM) platforms?
As the lead security analyst at a financial institution, you have been tasked with evaluating the effectiveness of the implemented security controls. During the audit, you need to verify that access control policies are correctly enforced and that there are no deviations from the standard configurations across all servers. Which of the following audit practices would be the MOST effective for this purpose?
Conducting a configuration audit
Executing a financial audit
Performing a performance audit
Undertaking an operational audit
Answer Description
A configuration audit specifically assesses configurations against established security baselines and policies, ensuring that systems are compliant with the required security settings. This would detect deviations in access control policies and configurations from the standard across servers. A performance audit, while it assesses the efficiency and effectiveness of an organization's processes, would not focus solely on security settings and policies. A financial audit is concerned with the financial accounts and transactions of an organization, and while an operational audit evaluates the operational aspects of an organization, it does not concentrate on access control policies and system configurations to the extent necessary for the given task.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a configuration audit?
How do access control policies relate to configuration audits?
What are examples of tools used for conducting configuration audits?
Which of the following best describes why an organization must be aware of local and regional regulations when developing their security program?
To apply universal standards of cybersecurity that are recognized globally.
To simplify the security program management by adhering to broader compliance laws.
To avoid the need for customizing security measures for different company branches.
To ensure compliance with specific legal requirements that may not be covered by national or global standards.
Answer Description
An organization needs to comply with local and regional regulations to ensure that they are not violating any laws that may be specific to the jurisdictions they operate in. Not understanding these local nuances could lead to legal issues, such as fines or sanctions. For example, certain regions may have specific requirements for data protection that differ from national laws, such as stricter privacy regulations that mandate data residency within the region. National and global standards, while essential, may not cover all aspects of the local regulatory environment, and universal standards do not typically exist for cybersecurity, hence the specificity of the correct answer.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of local or regional regulations that organizations must consider for their security programs?
How do local regulations differ from national or global cybersecurity standards?
What are the consequences of failing to comply with local or regional regulations in a security program?
An organization needs to ensure that its most critical systems are protected from external network threats and unauthorized access. Which of the following methods provides the MOST secure way to achieve this level of isolation?
Implement an air-gapped network for these systems
Install a firewall to filter traffic between these systems and other networks
Employ network address translation (NAT) for these devices
Use a VLAN to segment these systems from the corporate network
Answer Description
Implementing an air-gapped network means these critical systems are physically disconnected from any other networks and the internet, providing the highest level of isolation. This prevents remote access and network-based attacks. While using VLANs, firewalls, or NAT can enhance security through logical segmentation and filtering, they do not offer the same level of isolation because the systems remain connected to other networks, potentially exposing them to threats.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an air-gapped network?
Why is an air-gapped network more secure than a VLAN?
What are some disadvantages of using an air-gapped network?
During a post-incident review meeting, a security analyst is tasked with improving the incident response process based on recent events. Which of the following actions would BEST ensure a positive impact on future incident response capabilities?
Revising all security training materials without assessing their relevance to the incident.
Conducting a review of historical incident trends without making changes to existing procedures.
Updating the Incident Response Plan with specific improvements identified from the incident.
Deciding that the existing Incident Response Plan is sufficient since the incident was eventually contained.
Answer Description
The correct answer involves updating the Incident Response Plan with improvements identified during the review of a recent incident. This is the best choice because it directly applies feedback from actual incidents to enhance procedures and readiness for future events. Simply reviewing historical trends or concluding that the existing plan is sufficient does not provide the iterative improvement needed for effective incident response. Updating training materials without specific reference to the improvements identified may not address the issues encountered during the incident.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to update the Incident Response Plan after an incident?
What are some examples of improvements that might be added to an Incident Response Plan?
How does reviewing historical incident trends differ from updating the Incident Response Plan?
Which of the following best describes the process of sanitization in asset disposal?
Physically destroying a storage device to prevent it from being repurposed.
Compressing files on a storage device to save space before disposal.
Removing all data from a storage device to prevent data retrieval when it is disposed of or repurposed.
Encrypting the contents of a storage device as part of the disposal process.
Answer Description
Sanitization refers to the thorough removal of data from storage devices to prevent data retrieval and unauthorized access after the device is disposed of or repurposed. Physically destroying the device is an extreme form of sanitization, but it is not the overall definition, which also includes non-destructive methods. Compression is a data storage optimization technique, and encryption is a data protection method; neither constitutes data removal for disposal.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the common methods of sanitization?
How does sanitization differ from encryption?
Why is sanitization important in asset disposal?
A company's server room is equipped with motion sensors that alert security personnel when movement is detected after hours. What type of control are the motion sensors?
Preventive Control
Deterrent Control
Detective Control
Corrective Control
Answer Description
The motion sensors act as a Detective Control because they identify and alert to unauthorized activity. They do not prevent the incident from occurring but detect it so that appropriate action can be taken. Preventive Controls, like locks or access restrictions, are designed to stop unauthorized access from happening in the first place. Corrective Controls come into play after an incident to mitigate its impact, such as restoring data from backups. Deterrent Controls are intended to discourage potential attackers, like warning signs or visible security cameras.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of a Detective Control?
How does a Detective Control differ from a Preventive Control?
Can a single control act as both Detective and Deterrent?
An organization needs a backup facility that can quickly take over full operations with minimal downtime in the event of a disaster. Which type of site should they implement?
Hot site
Cold site
Warm site
Reciprocal site
Answer Description
A hot site is a fully equipped backup facility that is operational and ready to activate immediately after a disaster. It maintains up-to-date copies of data, hardware, and software, allowing an organization to resume normal operations rapidly. Warm sites are partially equipped and require additional time to become fully functional, while cold sites have only the basic infrastructure and need significant time to set up equipment and restore data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the main difference between a hot site and a warm site?
How does a hot site stay synchronized with the primary site?
Why might an organization choose a cold site instead of a hot site?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.