CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
An organization needs to ensure that encrypted data remains accessible even if an employee's cryptographic credentials are lost or become unavailable. Which of the following methods BEST achieves this objective?
Applying key stretching techniques
Implementing key escrow
Issuing digital certificates
Utilizing certificate revocation lists
Answer Description
Implementing key escrow involves securely storing copies of cryptographic keys with a trusted third party or designated authority. This allows the organization to recover encrypted data if the original keys are lost or inaccessible. Key stretching strengthens weak keys against brute-force attacks but does not help in recovering lost keys. Digital certificates associate public keys with user identities but do not provide a means for key recovery. Certificate Revocation Lists (CRLs) are used to revoke untrusted certificates and do not aid in data recovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is key escrow?
What are the risks of using key escrow?
How does key stretching differ from key escrow?
A network administrator implements a security measure that filters all network traffic, blocking any connections from known malicious IP addresses to prevent unauthorized access to the internal network. Which type of security control is being described?
Deterrent
Detective
Preventive
Corrective
Answer Description
A firewall that filters traffic to block unauthorized access is a classic example of a preventive control. Preventive controls are designed to stop an incident from occurring. In this scenario, the firewall is proactively preventing a potential breach. Detective controls, such as an Intrusion Detection System (IDS), would identify an attack as it happens or after the fact. Corrective controls, like restoring from a backup after a ransomware attack, aim to limit the damage after an incident. Deterrent controls, such as warning banners, are meant to discourage attackers but do not actively block them.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of firewalls?
What do you mean by unauthorized access in the context of firewalls?
How does a firewall block unauthorized access?
A technology company is planning to outsource its customer data management to a third-party vendor. Before sharing any sensitive information, the company wants to ensure that the vendor is legally obligated to maintain the confidentiality of the data. Which document should the company require the vendor to sign?
NDA
MSA
MOU
SLA
Answer Description
A Non-Disclosure Agreement (NDA) is specifically designed to legally bind parties to keep shared sensitive information confidential. While other agreements like Service-Level Agreements (SLA), Master Service Agreements (MSA), and Memorandums of Understanding (MOU) address different aspects of vendor relationships, the NDA focuses on confidentiality.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does NDA stand for and what is its purpose?
What is the difference between an NDA and an MSA?
When should a company use an NDA?
What process converts plaintext into a coded format to prevent unauthorized access?
Tokenization
Obfuscation
Hashing
Encryption
Answer Description
Encryption is the process of converting plaintext into a coded format known as ciphertext, which can only be read by authorized parties who have the decryption key. This process uses an algorithm and a key to transform the readable data into an unreadable format, thereby protecting the data from unauthorized access or eavesdropping.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is encryption and how does it work?
What is the difference between encryption and hashing?
What are common encryption algorithms used today?
An organization that handles top-secret defense research maintains a database server containing classified schematics. To comply with policy, the server must be completely unable to send or receive data over any wired or wireless network, thus preventing remote compromise or accidental data exfiltration. Which strategy best satisfies this requirement?
Enabling a host-based firewall
Implementing an air-gapped system
Using network segmentation with VLANs
Deploying an Intrusion Detection System (IDS)
Answer Description
An air-gapped system is physically isolated from all other networks, including the Internet. Because no network interfaces remain connected, data cannot enter or leave electronically, providing maximum protection for highly sensitive assets. A host-based firewall, VLAN segmentation, or an IDS can restrict or monitor traffic, but all still depend on an active network connection and therefore cannot guarantee total isolation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an air-gapped system and how does it enhance security?
What are the limitations of using a host-based firewall?
How does network segmentation with VLANs work, and what are its shortcomings?
An organization has detected suspicious activity targeting their customer database. Which of the following threat actors is MOST likely pursuing financial gain through the exfiltration and subsequent sale of confidential customer information?
An unskilled attacker seeking recognition
Nation-state
Hacktivist
Organized crime
Answer Description
Organized crime groups often engage in the theft of data for the purpose of selling it on the black market, as it can be extremely profitable. Nation-state actors are typically more interested in espionage or sabotage; hacktivists are motivated by political or societal goals, and insiders might seek revenge or intellectual challenge, but are less likely to sell data on a scale consistent with organized crime.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What methods do organized crime groups typically use to gather customer information?
How does the black market for stolen data operate?
What distinguishes organized crime from other types of threat actors?
A healthcare organization relies on a third-party service provider to manage its electronic health records (EHR) system. Recently, the service provider experienced a security breach, potentially exposing sensitive patient information. What type of vulnerability does this scenario best illustrate?
Zero-day
Insider Threat
Misconfiguration
Supply Chain
Answer Description
The correct answer is Supply Chain. This scenario highlights the vulnerability that arises from dependence on a third-party service provider, which is a key component of the supply chain. An Insider Threat involves risks from within the organization, Zero-day refers to previously unknown vulnerabilities, and Misconfiguration pertains to incorrect setup of systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common examples of supply chain vulnerabilities in healthcare?
How can organizations mitigate supply chain vulnerabilities?
What role do third-party service providers play in the security of electronic health records?
As an IT manager, you have been tasked with reviewing the company's password policies to ensure they align with best practices for security. Upon examination, you find out that the policy requires all employees to change their passwords every 90 days. What change would you recommend to improve password security effectively while balancing user convenience?
Remove the password expiration policy and allow users to keep passwords indefinitely.
Mandate that all users create passwords with a minimum length of 30 characters.
Implement multi-factor authentication and increase password complexity requirements.
Shorten the password expiration period to require changes every 45 days.
Answer Description
The most effective change to improve password security while considering user convenience is to increase the complexity of the passwords and implement multi-factor authentication. Frequent password changes can often lead to weaker passwords as users may choose easier to remember (and guess) passwords or make minor alterations to their existing ones. By increasing the complexity and using multi-factor authentication, a stronger security posture is achieved without unnecessary frequency in password changes that often leads to diminished security.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is multi-factor authentication, and why is it important for security?
What are strong password complexity requirements?
How can frequent password changes affect user behavior and security?
Which system is responsible for examining network traffic to identify undesirable activity and can actively intervene to prevent or block such activities?
A system that actively engages to interrupt or block potential security threats detected in network traffic.
A system that optimizes web traffic by caching frequently accessed resources for better performance.
A system dedicated to monitoring for compliance with data governance and regulatory standards.
A system that reinforces network architecture by enhancing data packet routing efficiency.
Answer Description
A system that has the ability to not only monitor network activities for malicious actions but also take proactive measures to interrupt or stop these activities serves as a protective mechanism against threats. This is the essential function of an Intrusion Prevention System, which is what separates it from similar systems that only detect and alert but do not take preventative actions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Intrusion Prevention System (IPS)?
How does an IPS differ from an Intrusion Detection System (IDS)?
What types of threats can an IPS help prevent?
Within the context of information security, which term is used to describe enforceable directives issued by a government entity that organizations are legally bound to follow?
Protocols
Mandates
Frameworks
Regulations
Guidelines
Answer Description
The correct answer is 'Regulations'. Regulations are specific, enforceable requirements laid down by governmental authorities, and organizations must adhere to them to ensure compliance within various domains, including data protection and privacy. 'Guidelines' offer advice or suggestions but are not legally enforceable. 'Frameworks' provide a structured approach to addressing complex issues but also lack the force of law. 'Protocols' generally refer to technical agreements for data exchange and communications in IT systems. Finally, while 'Mandates' require action, the term is broad and may not necessarily pertain to legally enforceable directives like regulations do.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of regulations in information security?
How do regulations differ from guidelines in information security?
What is the role of compliance in relation to regulations?
A security manager wants to implement an approach that minimizes implicit trust and ensures every access request is fully authenticated, authorized, and encrypted before granting access to resources. Which of the following security models BEST meets these requirements?
Zero Trust Architecture
Security through Obscurity
Defense in Depth
Principle of Least Privilege
Answer Description
Zero Trust Architecture is designed to eliminate implicit trust and enforce strict verification for every user and device attempting to access network resources. It requires full authentication, authorization, and encryption for each access request, effectively meeting the manager's requirements. The Principle of Least Privilege limits access rights but doesn't address continuous authentication or the elimination of implicit trust for each request. Defense in Depth employs multiple layers of security but does not specifically focus on the trust model for access requests. Security through Obscurity is not a valid or effective security strategy, as it relies on secrecy rather than robust security measures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of Zero Trust Architecture?
How does Zero Trust Architecture differ from traditional security models?
What role does encryption play in Zero Trust Architecture?
A financial institution is implementing a policy that allows employees to use their personal smartphones for work-related tasks. The institution wants to ensure that company-specific information and configurations can be remotely removed from these smartphones when an employee terminates employment, while preserving the employee's personal data and apps. Which feature should the company look for in a software solution that allows for the central management of mobile devices?
Remote locking
Full wipe
Selective wipe
Encryption
Answer Description
A feature known as a 'selective wipe' or 'corporate wipe' is designed for the scenario presented. It allows an organization to remove only the data and configurations that pertain to the company, preserving the personal information of the user. This is critical for organizations that allow the use of personal devices for work, to manage the risk associated with data retention when employees leave. A 'full wipe' would erase all data from the device, which affects personal information and therefore is not suitable. 'Remote locking' secures a device against unauthorized use, but it doesn't address the removal of data. 'Encryption' secures data but does not offer a method for selective removal of company data upon employee departure.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a selective wipe?
What are the risks of not using a selective wipe?
How does mobile device management (MDM) help with a selective wipe?
A company is planning to assess its network security by simulating an attack from malicious hackers. They aim to identify potential security gaps and vulnerabilities that could be exploited. What is the BEST type of penetration testing approach for this scenario?
Reconnaissance
Partially Known Environment Penetration Test
Unknown Environment Penetration Test
Known Environment Penetration Test
Answer Description
An Unknown Environment Penetration Test is the best approach in this scenario because it simulates the actions of an actual attacker that has no prior knowledge of the network. This type of test can provide the most realistic assessment of security as it evaluates the organization's defenses from the perspective of an uninformed attacker, which is a common threat. A Known Environment Penetration Test is not the best choice because it assumes prior knowledge of the system's internals which may not be the case for real-world attackers. The Partially Known Environment Penetration Test provides a middle ground between known and unknown and is less realistic than the unknown approach for simulating a full external threat. Reconnaissance is a phase within penetration testing rather than a complete testing approach and does not alone provide a comprehensive assessment of system vulnerabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is penetration testing and why is it important?
What are the differences between known, unknown, and partially known environment penetration tests?
What does the reconnaissance phase entail in penetration testing?
In a recent audit of a secure facility, it was noted that the employee access system employs badges that are not programmed to confirm the identity of the badge reader before transmitting data. Which specific vulnerability are these badges most at risk of?
Social engineering tactics
Email compromise
Encryption breaking
Radio-Frequency Identification (RFID) cloning
Answer Description
The badges in question are at risk of Radio-Frequency Identification (RFID) cloning. The lack of a mutual authentication process in the badge system permits an attacker to easily capture the badge's signal and create a duplicate without being verified by the reader. This process leads to unauthorized individuals potentially gaining access to secured facilities. Mutual authentication is a security feature where a badge and its reader verify each other before any data is transmitted. Options such as 'Email compromise' and 'Social engineering tactics' are not directly related to the scenario described where radio-frequency signals could be exploited. 'Encryption breaking' is also incorrect as it doesn't directly pertain to the cloning of an RFID signal, which is an issue distinct from cryptographic weaknesses.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is RFID cloning and how does it happen?
What is mutual authentication and why is it important?
What other security measures can protect against RFID cloning?
Which of the following attributes is MOST commonly associated with cyberattacks initiated by organized crime groups?
Primarily focuses on service disruption without financial motivations
Low technical capacity and limited financial backing
Acts based primarily on philosophical or political beliefs
High level of resources and sophisticated capabilities
Answer Description
The correct answer is that organized crime groups are known for their high level of resources and sophisticated capabilities. These groups are typically well-funded and deploy a range of technical and human resources to carry out complex attacks, often with a primary motivation of financial gain. The other options are incorrect. Acting based on philosophical or political beliefs is characteristic of hacktivists. Focusing on service disruption without financial motives can also be a trait of hacktivists. Low technical capacity and limited financial backing are attributes of an unskilled attacker, not a sophisticated organized crime group.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are organized crime groups in the context of cyberattacks?
What distinguishes cyberattacks by organized crime from those by hacktivists?
How do organized crime groups maintain their level of sophistication in cyberattacks?
Neat!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.