CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
A security manager wants to implement an approach that minimizes implicit trust and ensures every access request is fully authenticated, authorized, and encrypted before granting access to resources. Which of the following security models BEST meets these requirements?
Security through Obscurity
Zero Trust Architecture
Principle of Least Privilege
Defense in Depth
Answer Description
Zero Trust Architecture is designed to eliminate implicit trust and enforce strict verification for every user and device attempting to access network resources. It requires full authentication, authorization, and encryption for each access request, effectively meeting the manager's requirements. The Principle of Least Privilege limits access rights but doesn't address continuous authentication or the elimination of implicit trust for each request. Defense in Depth employs multiple layers of security but does not specifically focus on the trust model for access requests. Security through Obscurity is not a valid or effective security strategy, as it relies on secrecy rather than robust security measures.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key principles of Zero Trust Architecture?
How does Zero Trust Architecture differ from traditional security models?
What role does encryption play in Zero Trust Architecture?
An organization has just deployed a new network infrastructure device and assigned a systems administrator to ensure it is secured. What is the BEST initial action the systems administrator should take to mitigate the risk of unauthorized access due to common credential attacks?
Change the default credentials immediately
Update the firmware to the latest version
Conduct a full vulnerability scan on the device
Enforce account lockout policies
Answer Description
Changing the default credentials is the best initial step for securing new devices. Attackers often use known default usernames and passwords to gain unauthorized access to new system installations. Resetting these credentials to unique and strong username/password combinations significantly reduces the risk of simple but effective attacks. Updating firmware, while important, is generally focused on addressing functional and security issues rather than preventing unauthorized access due to default credentials. Enforcing account lockout policies is more about responding to attack attempts rather than preemptively mitigating the risk. Scanning for vulnerabilities is an ongoing security practice but does not directly address the specific risk of default password use.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to change default credentials on network devices?
What are some examples of strong passwords to use instead of default ones?
What are common credential attacks that organizations should be aware of?
A financial institution is updating its information security program. Who should be designated as the risk owner for financial data breaches?
The Security Analyst
The IT Support Staff
The Data Owner
The Chief Information Officer (CIO)
Answer Description
The Data Owner is responsible for managing and mitigating risks related to their data. They have the authority and accountability for the data, making them the appropriate risk owners.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the responsibilities of a Data Owner?
What is the difference between a Data Owner and a Chief Information Officer (CIO)?
Why is it important to have designated risk owners for data?
A software development company identifies that one of their third-party libraries has a known vulnerability that cannot be patched immediately. To continue operations without accepting the risk as it is, which strategy should they apply?
Mitigate
Accept
Avoid
Transfer
Answer Description
The best strategy here is 'Mitigate', which means that the company should take actions to reduce the impact or likelihood of the risk. This can include adding additional security controls or seeking alternative solutions to address the identified risk temporarily until the vulnerability can be patched. 'Transfer' would generally imply shifting the risk to another party, such as through insurance, but it would not be a direct action against the vulnerability in the software. 'Accept' would be incorrect because the question states that they do not want to accept the risk as it is. 'Avoid' generally implies ceasing to use the at-risk component altogether, which may not be feasible for operational continuity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common ways to mitigate vulnerabilities in software?
What does it mean to transfer risk, and when is it appropriate?
Can you explain why 'accepting' a risk can be a poor choice in some situations?
A security manager is tasked with calculating the reliability of the organization's network infrastructure. Over the course of a single year, the total operational period was 8760 hours, during which the system encountered 5 unplanned outages. What is the Mean Time Between Failures (MTBF) for this network infrastructure based on the provided data?
2190 hours
1460 hours
1752 hours
1600 hours
Answer Description
Mean Time Between Failures (MTBF) is a reliability metric that indicates the average time between system breakdowns or failures. It is calculated by dividing the total operational time by the number of failures.
MTBF Calculation:
Total operational time (T) = 8760 hours (given)
Number of unplanned outages (N) = 5 (given)
MTBF = T / N
MTBF = 8760 hours / 5 outages = 1752 hours
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is MTBF and why is it important?
How is MTBF different from MTTR?
How can organizations improve their MTBF?
Which of the following best describes how an access control list (ACL) can be applied on a router interface to control packet flow?
It can be applied inbound and/or outbound on the same interface, allowing filtering of packets entering or leaving the interface according to defined rules.
It can only be applied in the inbound direction and filters traffic entering the router.
It can be applied in either direction, but once applied you cannot have both an inbound and an outbound ACL on the same interface.
It can only be applied in the outbound direction and filters traffic leaving the router.
Answer Description
An ACL can be bound to an interface in the inbound direction to inspect packets as they arrive and/or in the outbound direction to inspect packets as they leave. Administrators may place separate ACLs in each direction on the same interface, providing granular control over traffic entering and exiting the device.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different types of Access Control Lists (ACLs)?
How do ACLs impact network performance?
What is the purpose of using ACLs in network security?
An organization is compromised after an external company that provides critical services is breached. This is an example of which type of supply chain vulnerability?
Software supplier vulnerability
Service provider vulnerability
Hardware supplier vulnerability
Cryptographic vulnerability
Answer Description
This is a service provider vulnerability because the breach occurred through an external company providing services to the organization. When service providers are compromised, they can inadvertently expose their clients to security risks. This differs from hardware or software supplier vulnerabilities, which involve flaws in the physical devices or applications supplied to the organization.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of service provider vulnerabilities?
How can organizations mitigate the risks associated with service provider vulnerabilities?
What is the difference between service provider vulnerabilities and other types of supply chain vulnerabilities?
Which statement about creating heat maps during a wireless site survey is TRUE?
Heat maps can only be created after access points are installed and on-site signal readings are taken.
Heat maps are produced automatically by the wireless controller only after clients connect to the network.
Predictive modeling can generate accurate heat maps before the physical environment is fully built.
Heat maps are necessary only for outdoor deployments, not for indoor wireless networks.
Answer Description
Predictive (virtual) site surveys use computer modeling and digital floor plans to estimate RF propagation and can generate heat maps before a building is finished or remodeled. Although these simulated heat maps must later be validated with an on-site survey, they are accurate enough for preliminary design, budgeting, and cabling plans. Therefore, heat-map creation does not always require the physical environment to be in its final state.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a heat map in the context of wireless network deployment?
What factors can affect the accuracy of a heat map?
Why are site surveys important for wireless network planning?
A security administrator at a mid-size company is selecting an algorithm for secure email encryption that relies on a public/private key pair rather than a shared secret, to implement digital signatures as well. Which of the following algorithms satisfies this requirement?
RSA
Blowfish
RC4
AES
Answer Description
RSA uses mathematically linked public and private keys to encrypt or sign data, making it an asymmetric algorithm. The other listed algorithms-AES, Blowfish, and RC4-are all symmetric ciphers that rely on the same shared key for both encryption and decryption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is asymmetric cryptography?
How does RSA work?
What are some other asymmetric algorithms?
A software development company wants to allow its users to log into a third-party code repository from their in-house development platform. The company aims to facilitate this without sharing user credentials with the third-party service. Which protocol is best suited to allow the company's platform to request access to the third-party service on behalf of the user?
Lightweight Directory Access Protocol (LDAP)
Open Authorization (OAuth)
Terminal Access Controller Access-Control System Plus (TACACS+)
Remote Authentication Dial-In User Service (RADIUS)
Answer Description
Open Authorization, commonly known as OAuth, is best suited for this purpose. OAuth is a protocol that enables applications to obtain limited access to user accounts on an HTTP service without passing user credentials to the application. It works by using access tokens provided by the authorization server, which mediate the authentication of the end user by the information provider.
- LDAP (Lightweight Directory Access Protocol) is primarily used for accessing and maintaining distributed directory information services over an IP network, which is not the goal in this scenario.
- RADIUS (Remote Authentication Dial-In User Service) provides centralized authentication, authorization, and accounting for users who connect and use a network service, but does not cater to the specific needs of application-to-application authorization.
- TACACS+ (Terminal Access Controller Access-Control System Plus) provides detailed accounting information and flexible administrative control over authentication and authorization processes, but it is not designed for delegating user authorization between web services.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is OAuth and how does it work?
What is the difference between OAuth and LDAP?
What are access tokens in OAuth, and why are they important?
During a routine vulnerability assessment of the network, an analyst receives a notification of potential malicious traffic that, upon further investigation, turns out to be legitimate and normal network activity. What does this notification exemplify?
A false negative
A true positive
An intrusion attempt
A false positive
Answer Description
A false positive occurs when a security system incorrectly identifies benign activity as a threat. In this scenario, the system erroneously flagged normal network traffic as potentially malicious, which is a classic example of a false positive. It is crucial for security analysts to recognize and address false positives to avoid unnecessary responses to non-threatening activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common causes of false positives in security systems?
How can security analysts effectively manage false positives?
What are the implications of false positives in a security context?
A large international corporation has been experiencing consistent network probing and has identified the attacker's origin as a well-funded organization with political motives, which leverages high-level expertise to avoid detection and attribution. What type of threat actor is most likely responsible for this activity?
Unskilled attacker
Hacktivist
Nation-state
Insider threat
Answer Description
Based on the description provided, the attacker is most likely a Nation-state actor. Nation-state actors are typically well-funded, have political motives, and possess advanced capabilities to avoid detection and carry out sophisticated attacks. Unskilled attackers usually lack funding and high-level expertise; hacktivists could have political motives but do not typically possess the level of sophistication described; insider threats involve individuals within the organization itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Nation-state actor in cybersecurity?
How do Nation-state actors avoid detection?
What distinguishes a hacktivist from a nation-state actor?
What improvements does a VLAN offer for network security?
Logically separates network segments
Physically restricts unauthorized devices from network access
Allows for session dropping in the event of an anomaly detection
Provides layer 4 filtering (TCP/UDP)
Answer Description
A Virtual Local Area Network (VLAN) provides a logical or virtual way to separate areas of a network. This means devices can physically share the same network infrastructure (e.g. using a common switch) but remain separated from each other on the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a VLAN and how does it work?
What are the security benefits of using VLANs?
How do VLANs contribute to network management?
What cryptographic technique involves adding random data to a message before hashing to make it more resistant to rainbow table attacks?
Salting
Digital signatures
Key stretching
Blockchain
Answer Description
Salting is the correct answer because it involves adding random data (salt) to a message before hashing. This makes the resulting hash value unique, even for identical messages, which helps prevent rainbow table attacks. Rainbow tables are precomputed tables of hash values that can be used to quickly reverse hashes and obtain the original message. By adding a unique salt to each message before hashing, the resulting hash values will be different, rendering rainbow tables ineffective.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a rainbow table?
How does salting work in practice?
What is key stretching and how does it relate to salting?
What category of data classification should be applied to information that is intended for general public disclosure and does not require any special handling or protection measures?
Sensitive
Restricted
Public
Confidential
Answer Description
The correct category for data that is intended for the public and does not need protection is Public. This classification is used for information that can be freely accessed and shared without any risk of harm to individuals or the organization. Sensitive and Confidential data require strict access controls due to their potential impact on privacy and business operations. Restricted is incorrect as it implies limited access due to legal, regulatory, or operational requirements.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'data classification' mean?
What are the implications of classifying data as 'Public'?
How do 'Sensitive' and 'Confidential' data differ from 'Public' data?
Smashing!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.