CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 20
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
During a routine update, an IT administrator accidentally overwrites crucial configuration files, causing incorrect data to be displayed to users. Which fundamental security principle is most impacted by this incident?
Availability
Authentication
Integrity
Confidentiality
Answer Description
Integrity refers to the accuracy and reliability of data. When the IT administrator overwrote the configuration files, it led to incorrect data being presented, thus compromising data integrity. Confidentiality involves protecting information from unauthorized access, which is not the issue here. Availability ensures that systems and data are accessible when needed, but the systems are still operational. Authentication relates to verifying the identity of users or systems, which is not impacted in this scenario.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does data integrity mean in cybersecurity?
What are some common methods to ensure data integrity?
How does a lack of integrity differ from a breach of confidentiality?
Which of the following BEST describes a decentralized security governance structure?
Lower-level departments have decision-making authority.
All security decisions are outsourced to a third-party vendor.
A single, rigid security policy is enforced across all departments.
Decisions are made exclusively at the executive level.
Answer Description
In a decentralized governance structure, decision-making authority is distributed among various departments or business units, allowing for policies and procedures tailored to their specific needs. This contrasts with a centralized model where decisions are made at the executive level and a single policy is enforced company-wide. While security functions can be outsourced, this is a separate concept from the internal decision-making structure of an organization's governance model.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the main advantages of a decentralized security governance structure?
How does a decentralized security model differ from a centralized model?
What are some risks associated with a decentralized security governance structure?
A company is implementing a hybrid cloud solution, integrating on-premises infrastructure with cloud services. What should be the company's FIRST priority to ensure security consistency across both environments?
Establishing a responsibility matrix defining security obligations of the cloud provider and the client
Procuring cybersecurity insurance for potential breaches in the cloud environment
Ensuring all cloud services are running the latest version of their operating systems
Creating a common set of security policies for both on-premises and cloud environments
Answer Description
The establishment of a responsibility matrix is crucial in a hybrid cloud approach because it clearly outlines the security responsibilities of the cloud service provider and the client. It ensures that both parties are aware of their specific obligations, which in turn minimizes gaps in security coverage. Understanding who is responsible for each aspect of security helps to prevent overlaps or omissions that can lead to vulnerabilities.
In regards to creating a common set of security policies and ensuring regulatory compliance, while these are important considerations, they come after defining the responsibility matrix, which lays the groundwork for security responsibilities and roles.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a responsibility matrix in the context of cloud security?
Why is a responsibility matrix prioritized over creating a common set of security policies?
How does regulatory compliance factor into the responsibility matrix?
Which of the following statements best describes the primary benefit of conducting static code analysis during the software development lifecycle?
It ensures that the source code adheres to the coding standards set by the organization to improve readability and maintenance.
It verifies that the code will compile without errors, ensuring that runtime environments are stable and less prone to crashes.
It identifies potential security vulnerabilities within the source code before the application is compiled or run, which can be addressed to prevent future exploits.
It automates the review process, thus enabling developers to focus solely on the implementation of new features rather than code security.
Answer Description
Static code analysis is most beneficial because it allows developers to find vulnerabilities and issues in code before the application is run or compiled. This 'shift-left' approach to security is proactive and can save time and resources by catching flaws early. While static code analysis tools can enforce coding standards and improve code quality, their primary security benefit is identifying vulnerabilities that could lead to exploits.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is static code analysis?
What does 'shift-left' mean in software development?
How is static code analysis different from dynamic analysis?
A security administrator is working on updates to critical security policy documents and needs to ensure that any modifications are tracked to maintain accountability, as well as the ability to revert to previous versions if necessary. Which solution would BEST fulfill this requirement?
Increasing the frequency of file backups
Enforcing stricter permissions on the file server
Storing documents in a locked file cabinet
Implementing a version control system
Answer Description
Version control systems are designed to manage changes to documents, computer programs, large websites, and other collections of information. By implementing a version control system, the administrator can track changes made to the security policy documents, establish who made each change, and revert to earlier versions of the documents if required. This provides an audit trail, fosters accountability, and ensures the integrity of documents over time. While permissions and backing up files are essential, these do not inherently provide the ability to manage and track changes to the documents as they evolve or maintain a history of revisions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a version control system?
How does a version control system ensure accountability?
What is the difference between file backups and version control?
A security analyst is tasked with implementing a solution to receive timely data on emerging malware, malicious IP addresses, and known vulnerabilities. Which of the following would BEST fulfill this requirement?
A threat feed
A Security Information and Event Management (SIEM) system
A security baseline
A vulnerability scanner
Answer Description
The correct answer is a threat feed. A threat feed is a real-time or near-real-time stream of data providing information on current and potential cyber threats, including indicators of compromise like malicious IPs, URLs, and malware signatures. A security baseline defines a standard state for a system, a SIEM is used to aggregate and analyze log data from internal sources, and a vulnerability scanner actively probes systems for weaknesses rather than providing a continuous external data stream.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a threat feed and how does it work?
How does a threat feed differ from a SIEM system?
What types of information are typically included in a threat feed?
A network administrator notices that an employee is using a significant amount of internet bandwidth by streaming high-definition videos for personal entertainment during work hours. This activity is slowing down the network for other users who are performing business-critical tasks. Which of the following policies should the administrator consult to determine if this is a violation and what the appropriate response should be?
Change Management Policy
Incident Response Policy
Disaster Recovery Policy
Acceptable Use Policy (AUP)
Answer Description
The correct answer is the Acceptable Use Policy (AUP). An AUP is a document that outlines what constitutes acceptable and unacceptable use of an organization's computing resources, including the network and internet access. It would specify rules regarding personal use of company bandwidth. The Incident Response Policy is for handling security incidents like breaches or malware infections. The Change Management Policy governs the process for making changes to IT systems. The Disaster Recovery Policy outlines procedures for restoring operations after a major disruption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an Acceptable Use Policy (AUP)?
Why is personal use of company bandwidth addressed in an AUP?
How does an AUP differ from an Incident Response Policy?
A company implements a mandatory security awareness training program for all employees to combat threats like phishing and social engineering. This type of training is an example of which security control type?
Technical
Preventive
Physical
Detective
Answer Description
Preventive controls are designed to stop an incident before it can happen. Security awareness training is considered a preventive control because its primary purpose is to educate employees on how to recognize and avoid security threats, thereby preventing security incidents from occurring. While it also directs behavior, its main function in this context is prevention.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of preventive controls in cybersecurity?
How does security awareness training help prevent phishing attacks?
What is the difference between preventive and detective controls?
Which term best describes the ability of a system or component to be operational and accessible when required for use?
Load balancing
Failover
Scalability
High availability
Answer Description
High availability refers to systems that are dependable enough to operate continuously without failing for a long period of time. It is often measured by the uptime in the context of an annual percentage. The incorrect options, while related to system performance and design, do not specifically relate to the concept of being operational and accessible when required.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is high availability in more detail?
How does high availability differ from failover?
What technologies or practices ensure high availability?
What term is used to describe the enhancement of a security team's effectiveness by employing tools and methods that allow fewer staff members to manage more resources?
Team augmentation
Workforce multiplier
Resource allocation
Staff scaling
Answer Description
The term 'Workforce multiplier' refers to methods and tools that extend the effectiveness and efficiency of a security team, enabling them to handle more work with fewer resources. This is crucial for modern security operations where the volume of threats and alerts can be overwhelming for small teams. By using automation, orchestration, and other advanced tools, even a limited staff can effectively manage and secure a large set of resources.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a workforce multiplier in cybersecurity?
How does automation help as a workforce multiplier?
What is the difference between workforce multipliers and traditional resource scaling?
Which of the following best represents the role of endpoint protection software as a system hardening technique in an organization's cybersecurity strategy?
To provide comprehensive security measures, such as antivirus and personal firewall capabilities, to individual devices within a network
To manage user permissions and access control lists across the network
To optimize the performance and speed of endpoint devices for better user experience
To backup data periodically and ensure disaster recovery for individual endpoint devices
Answer Description
Endpoint protection software's role as a system hardening technique is to enhance the security of individual devices within a network by providing a combination of various security measures against threats such as malware, exploits, and unauthorized access attempts. It typically includes functionalities like antivirus, antimalware, and personal firewalls. The correct answer encapsulates these capabilities. The incorrect answers either misrepresent the scope of endpoint protection or attribute unrelated functions to it.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is system hardening and why is it important for cybersecurity?
What specific threats does endpoint protection software defend against?
How does endpoint protection software differ from network-level security tools like firewalls?
What best describes the practice of giving users only the permissions they need to perform their work tasks?
The principle of least privilege
Permission auditing
Access all areas
Complete autonomy
Answer Description
The principle of least privilege is a security concept where a user is given the minimum levels of access, or permissions, needed to perform his or her job functions. This principle limits the access rights for users to the bare minimum necessary to perform their work. This helps to reduce the attack surface and minimize the potential for misuse of high-level access rights. The other options are incorrect because 'Complete autonomy' refers to having total independent control which does not limit permissions, 'Access all areas' typically implies no restriction on access permissions, and 'Permission auditing' is a process of reviewing permissions, not assigning them.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is the principle of least privilege important in cybersecurity?
How is the principle of least privilege implemented in organizations?
What is the difference between least privilege and permission auditing?
An organization determines that the cost of implementing controls to address a specific low-impact risk exceeds the potential loss, so management decides to do nothing further and simply budget for any possible consequences. Which risk response strategy is the organization employing?
Risk acceptance
Risk avoidance
Risk transference
Risk mitigation
Answer Description
The organization is choosing risk acceptance-it consciously retains the risk and any associated impact rather than investing in mitigation or shifting liability.
- Risk acceptance: The organization acknowledges the risk and its potential impact but takes no additional action beyond monitoring or budgeting for a loss.
- Risk transference: Liability is shifted to a third party (for example, via insurance or outsourcing).
- Risk mitigation: Controls are implemented to reduce either the likelihood or impact of the risk.
- Risk avoidance: The risky activity is eliminated altogether to remove the exposure.
Because the scenario states that management will simply absorb any consequences, it clearly aligns with risk acceptance.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What factors should an organization consider when deciding to accept a risk?
How does risk transference differ from risk acceptance?
What are examples of situations where risk acceptance might be appropriate?
What is the primary function of a hashing algorithm within the realm of cybersecurity?
To generate a unique 'fingerprint' of data that can be used to verify its integrity
To compress data to save storage space before transmitting over a network
To encrypt data so that it can be securely transmitted over public networks
To serve as the public key within a public-private key pair used for asymmetric encryption
Answer Description
The primary function of a hashing algorithm is to take an input (or 'message') and return a fixed-size string of bytes. The output, known as the hash, is typically a digest that represents the original data in a unique way. If the input changes by even a small amount, the hash will change significantly, known as the avalanche effect. The key aspect of a hash function is that it is a one-way function – data can be turned into a hash, but the hash cannot be turned back into the original data, ensuring data integrity. Hashes are broadly used to verify data integrity because they can reveal if data has been altered. This is crucial in many applications, such as verifying the integrity of downloaded files or the storage of passwords.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the avalanche effect in a hash function mean?
How is hashing different from encryption?
What are some common uses of hashing in cybersecurity?
A company's security team has recently upgraded the network firewall to a newer model to enhance security features. As a security analyst, what is the MOST important action to perform following the upgrade to ensure ongoing operational efficiency?
Schedule a meeting with the stakeholders to discuss the possibility of future upgrades.
Update the security policies and network configuration documentation to reflect changes made by the new firewall.
Implement additional firewall rules to immediately increase the security posture without a scheduled review.
Perform a complete network penetration test to identify potential new vulnerabilities introduced.
Answer Description
The documentation should be updated whenever changes are made to the security infrastructure. This includes major upgrades such as the implementation of a new firewall. Updating the documentation ensures that accurate information is available for the operation and maintenance of the security controls, as well as for audit purposes. Failing to update documentation can lead to confusion, improper configuration, and weaknesses in security. The incorrect options, while they may be important in other contexts, do not directly address the primary need for keeping an accurate historical record of system configurations and policy changes that affect security operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is updating security policies and network documentation critical after a firewall upgrade?
What kind of information should be included in the updated documentation after a firewall upgrade?
How does failing to update documentation impact security and operations?
Which type of digital certificate allows an organization to secure all subdomains of a domain with a single certificate?
Root certificate
Extended Validation certificate
Self-signed certificate
Wildcard certificate
Answer Description
A wildcard certificate allows an organization to secure a domain and all of its subdomains with a single certificate. This is achieved by using an asterisk (*) in the domain name portion of the certificate, representing all possible subdomains. Self-signed certificates are generated by the owner and are not trusted by default by browsers and operating systems. Extended Validation (EV) certificates provide higher levels of trust through a rigorous authentication process but do not inherently support multiple subdomains. Root certificates are used to sign other certificates in a certificate hierarchy but are not used to secure specific domains or subdomains.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a wildcard certificate?
How are wildcard certificates different from Extended Validation (EV) certificates?
How does a root certificate differ from a wildcard certificate?
A security professional is assessing the network infrastructure of a company and discovers that wireless access points are broadcasting an open network without any form of encryption. What is the BEST action to improve the security posture regarding this finding?
Implementing an Intrusion Detection System (IDS) to monitor wireless traffic
Enabling WPA3 on all wireless access points
Decreasing the signal strength to limit the wireless range
Changing the Service Set Identifier (SSID) to a less common name
Answer Description
Enabling WPA3 on wireless access points ensures that the wireless communication is encrypted, providing confidentiality and integrity for the data transmitted over the air. WPA3 is currently the strongest form of wireless security generally available, which protects against unauthorized access and eavesdropping.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is WPA3, and how does it improve wireless security?
How does encryption enhance wireless network security?
Why isn’t changing the SSID or reducing signal range sufficient for security?
Your company is launching a project to collaborate on cybersecurity research with a local university. The project's foundation is non-financial and aims to define the contribution of expertise and facilities from both parties. Which document best establishes the partnership without involving direct monetary transactions or detailed deliverables?
Collaborative terms outline
Contract
Memorandum of Agreement
Internally generated action plan
Answer Description
A Memorandum of Agreement (MOA) is the correct choice. An MOA is a formal document that outlines the terms and responsibilities for a cooperative project between two or more parties. While it can be legally binding, it is often used for collaborations where no money is exchanged, fitting the non-financial nature of the scenario. It is typically more detailed about responsibilities than a Memorandum of Understanding (MOU), which outlines broader goals and is generally not legally binding. A contract is incorrect because it is a legally enforceable agreement that requires an exchange of consideration (e.g., money), which the scenario explicitly excludes. An 'internally generated action plan' is an internal document, not an agreement between separate entities. 'Collaborative terms outline' is not a standard, recognized type of formal agreement.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between a Memorandum of Agreement (MOA) and a Memorandum of Understanding (MOU)?
Why is a contract not suitable for this scenario?
Can a Memorandum of Agreement (MOA) be legally binding?
What is the consequence of opting for expedient development and deployment measures that prioritize immediate functionality over long-term code maintainability and stability?
Technical debt
Code regression
Configuration drift
System entropy
Answer Description
The correct term for this consequence is 'technical debt.' It arises when development teams take action to expedite product releases or feature implementations at the expense of code maintainability and overall quality. While this may yield short-term benefits, it creates a metaphorical 'debt' that will have to be 'paid off' later with additional work to fix the rush-induced issues, potentially leading to security vulnerabilities. Alternative terms offered in the answers are related concepts within IT but do not specifically refer to the costs and future rework implied by rushed solutions.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some common examples of technical debt in software development?
How can technical debt lead to security vulnerabilities?
What strategies can development teams use to manage technical debt effectively?
During an audit, inspectors discovered that maintenance personnel without the required security clearance were routinely allowed into a secure data center. Which security control should be strengthened to prevent this unauthorized entry?
Access controls
Security awareness training
Firewalls
Intrusion detection systems
Answer Description
Access controls restrict entry to resources-whether a room, system, or dataset-to authorized subjects only. Because the breach involved unvetted staff walking into a sensitive area, the root cause is weak or missing door or identity-verification mechanisms. Strengthening access controls (for example, badge readers, biometric locks, or enforced approval lists) would ensure that only individuals with proper clearance may enter. Firewalls and intrusion detection systems protect logical network traffic, and security awareness training targets user behavior; none of those directly block physical entry to the data center.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are access controls and how do they work?
What is the difference between firewalls and access controls?
How do biometric locks improve physical security in access controls?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.