CompTIA Security+ Practice Test (SY0-701)
Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

CompTIA Security+ SY0-701 (V7) Information
CompTIA Security+ Certification Exam Overview
The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.
Question Types on the Security+ Exam
The Security+ exam includes two primary types of questions:
- Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
- Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.
Exam Prerequisites
CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.
Security+ Exam Domains
The SY0-701 exam focuses on five primary domains:
- General Security Concepts (12%)
- Threats, Vulnerabilities, and Mitigations (22%)
- Security Architecture (18%)
- Security Operations (28%)
- Security Program Management and Oversight (20%)
These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.
Exam Renewal Policy
The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.
Testing Centers
CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.
The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.
More reading:
Free CompTIA Security+ SY0-701 (V7) Practice Test
Press start when you are ready, or press Change to modify any settings for the practice test.
- Questions: 15
- Time: Unlimited
- Included Topics:General Security ConceptsThreats, Vulnerabilities, and MitigationsSecurity ArchitectureSecurity OperationsSecurity Program Management and Oversight
Which of the following best describes the primary purpose of directive controls in a security context?
To detect and respond to security incidents after they occur
To implement and manage security technologies
To discourage potential attackers from targeting the organization
To provide guidance and instructions on maintaining security
Answer Description
Directive controls are designed to direct the actions of individuals or systems within an organization. They provide guidance and instructions on how to maintain security and comply with established policies. Examples of directive controls include security policies and guidelines that outline acceptable behaviors, procedures, and best practices. These controls help ensure that employees and systems operate in a manner consistent with the organization's security objectives.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some examples of directive controls?
How do directive controls differ from other types of security controls?
Why are directive controls important for organizational security?
What is the primary importance of incorporating security requirements into the procurement process for new IT systems and services?
To transfer the responsibility for security from the organization to the external vendor
To ensure security controls are integrated into the design and contractual obligations from the beginning, reducing overall risks
To merely comply with external audit requirements, with minimal focus on actual security postures
To avoid the need for any further security assessments or monitoring once the system is deployed
Answer Description
Incorporating security requirements during the procurement process ensures that the security controls are integrated into the design and contractual obligations, which is vital to mitigate risks from the outset. Waiting until a system or service is deployed to consider security could result in higher costs due to retroactive changes and potential exposure to threats that could have been avoided.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to integrate security controls into the design of IT systems?
What are the potential consequences of not considering security during procurement?
How do contractual obligations play a role in security during procurement?
Which of the following is a decoy system designed to attract and analyze the behavior of attackers?
Honeytoken
Honeyfile
Honeynet
Honeypot
Answer Description
A honeypot is a security mechanism set up to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Honeypots can come in the form of network-attached systems, applications, or data that simulate a real environment but are closely monitored to gain insights into attacker motives and tactics. This is distinctly different from the other options: Honeynet is a network of honeypots, a honeyfile is a decoy file rather than a system, and a honeytoken is not a system, but a piece of data or a token that serves as a trap.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the purpose of a honeypot in cybersecurity?
How does a honeynet differ from a single honeypot?
What are honeytokens and how are they used in security?
In a Zero Trust security model, what component is responsible for making access decisions based on established policies and the evaluation of trustworthiness?
Data Plane
Authentication Server
Segmentation Gateway
Control Plane
Answer Description
The Control Plane is responsible for making access decisions in a Zero Trust model. It analyzes the trustworthiness of entities and enforces established policies to determine whether access should be granted or denied. The Data Plane, in contrast, handles the actual transfer of data and does not make policy-based decisions. Authentication servers and segmentation gateways, while they may contribute to the overall security posture, are not the components responsible for the described decision-making process within the Zero Trust architecture.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does the Control Plane do in a Zero Trust model?
How does the Control Plane evaluate trustworthiness?
What is the difference between the Control Plane and the Data Plane?
Which statement about using standardized vulnerability severity scores (for example, the CVSS Base score) to determine patch-remediation priority is MOST accurate for an organization?
Relying only on the standardized numerical score is sufficient; patches should be applied strictly in descending score order.
The score is a useful starting point, but asset criticality, exploit likelihood, and business impact must also be assessed before setting priorities.
Combining the score with an up-to-date asset inventory is always enough; additional threat-intelligence data is unnecessary.
The score can be ignored entirely; patch priority should be based only on how recently the vendor released the patch.
Answer Description
Numerical severity scores provide a useful starting point, but they do not capture organization-specific factors such as asset criticality, exploit likelihood in the given environment, compensating controls, and overall business impact. The CVSS specification recommends that consumers supplement the Base score with Temporal and Environmental metrics and with additional risk data to arrive at a context-aware priority. Therefore, relying on the score alone is insufficient; broader organizational context must be considered when setting remediation priorities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are standardized frameworks for evaluating security vulnerabilities?
Why is organizational context important in assessing security vulnerabilities?
What are some potential impacts of prioritizing updates based solely on numerical vulnerability scores?
You are a security consultant for a small company. The owner says attackers recently gained access to the company's email account. Soon after, the attackers took control of the company's website and say they will restore it only after they receive a payment. The hosting provider confirms that the web servers are healthy and no unusual logins have occurred, yet users cannot reach the company's site. Based on this information, which type of attack has most likely been carried out against the website?
Session hijacking
DNS hijacking
Cross-site scripting (XSS)
Man-in-the-middle (MitM)
Answer Description
The symptoms point to DNS hijacking. By compromising the organization's domain-registrar or authoritative DNS settings, the attackers redirected the company's domain away from its legitimate web servers. Because the web servers are still functioning and no suspicious logins are recorded, the problem lies with the DNS records, not the host itself. Man-in-the-middle, session hijacking, and cross-site scripting would not make the site completely unreachable or allow the attackers to demand a ransom for restoring access to the entire domain.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is DNS hijacking and how does it work?
What are the signs that a DNS hijacking has occurred?
How can a company recover from a DNS hijacking incident?
A security administrator needs to deploy a network security device that will analyze and potentially block malicious traffic without being bypassed if it fails. Which deployment option aligns best with this requirement?
Deploy the device in inline mode with fail-closed configuration.
Use port mirroring to duplicate traffic to the device.
Implement the device as an external monitor that gets copied traffic from a network switch.
Set up the device as a network tap to passively monitor traffic.
Answer Description
An inline device is deployed directly on the network path; all traffic must pass through it. This is ideal for scenarios where traffic analysis and blocking potential threats is necessary. Furthermore, since the device must not be bypassed even if it fails, an inline device must be used instead of a tap or monitor mode, which allows traffic to bypass the device if it fails or is not active.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does it mean for a security device to be deployed in inline mode?
Can you explain what a fail-closed configuration is?
What are the limitations of using network taps and port mirroring for security analysis?
An administrator is reviewing the organization's disaster recovery plan and wants to confirm that critical files can be brought back online after a ransomware attack. Which of the following activities BEST demonstrates that the backup strategy will enable a full recovery?
Encrypting the backup archives with AES-256.
Scheduling differential backups to run every hour.
Performing a periodic restoration test in a nonproduction environment.
Storing backup tapes in an offsite, climate-controlled vault.
Answer Description
Periodically restoring data from backup media in a test (or otherwise nonproduction) environment proves that the data can actually be recovered and that the organization's procedures meet recovery-time and recovery-point objectives. Encrypting archives, storing tapes off-site, and scheduling differential backups all improve aspects of confidentiality, availability, or frequency, but none of them confirms that the data can be restored successfully.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to test backup restorations?
What types of loss events should backups be prepared for?
What are some common methods for testing backup restorations?
An organization has recently experienced a security breach where multiple endpoints were remotely controlled by an unauthorized entity, leading to the unauthorized use of system resources for mining cryptocurrency. Which type of malware is MOST likely responsible for this incident?
Worm
Botnet
Ransomware
Logic Bomb
Answer Description
The correct answer is 'Botnet' because it describes a network of compromised computers that are controlled remotely, typically without the owners' knowledge, to perform tasks such as cryptocurrency mining. A botnet infection matches the scenario described where multiple endpoints are being remotely controlled. A Ransomware infection would generally encrypt files and demand payment, which is not mentioned in the scenario. A Logic Bomb would execute malicious code based on certain conditions being met, which is not indicated in this scenario. A Worm would self-replicate to spread to other computers, but it does not inherently control multiple endpoints for a task like cryptocurrency mining.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a Botnet?
How do attackers create a Botnet?
What differentiates Botnets from other types of malware?
Which of the following examples represents a misconfiguration scenario that could lead to security vulnerabilities?
A web application is using HTTPS instead of HTTP to encrypt its traffic.
A server is configured with the manufacturer's default username and password for administrative access.
A system regularly receives updates to its antivirus definitions.
All desktop computers in an office have the latest operating system patches installed.
Answer Description
Having services running with default credentials is considered a misconfiguration because attackers often use these well-known credentials to gain unauthorized access to systems. Changing default credentials is a basic security measure that should be applied to all systems and services to prevent unauthorized access. The other options provided are not inherently misconfigurations, as regular software updates, using secure protocols, and having an up-to-date antivirus are recommended practices for securing systems.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why are default credentials a security risk?
What are some best practices for securing administrative accounts?
How do antivirus definitions relate to system security?
An organization must transmit sensitive payroll data over the public Internet to a cloud-based payroll service. Because a dedicated private circuit is not financially possible, the security team looks for another measure that will still ensure confidentiality and integrity of the data in transit. Which of the following BEST fits the definition of a compensating control in this situation?
Require administrators to complete additional security-awareness training
Review firewall and application logs on a daily basis
Schedule quarterly external penetration tests
Establish an IPsec-based VPN tunnel for the transmission
Answer Description
Creating an IPsec VPN (or other strong encryption such as TLS 1.3) establishes an encrypted tunnel that offsets the risk of sending data across an untrusted network when the preferred primary control-a private, physically isolated link-cannot be used. That encrypted tunnel therefore serves as a compensating control. Daily log reviews, quarterly penetration tests, and additional awareness training are useful but do not directly provide equivalent protection for the specific gap (lack of a secure transmission channel).
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is encryption, and why is it important for data transmission?
What is a Virtual Private Network (VPN), and how does it work?
What are intrinsic and direct security assurances in data transmission?
When building a customer-facing web application, what approach to input validation should be implemented to MOST EFFECTIVELY mitigate injection attacks?
Implementing a allowlist input validation mechanism that accepts only specified inputs
Relying on a blocklist input validation to exclude known dangerous characters and patterns
Enforcing data type constraints and requiring inputs to match the expected data types
Using cryptographic hashing of all inputs to avoid storing or processing plaintext input data
Answer Description
Utilizing a allowlist input validation approach serves as the most effective mitigation technique against injection attacks because it permits only known safe inputs, based on a predefined set of criteria, to be processed by the application. This control is strict by nature and denies all input that does not strictly conform to the expected and validated format. On the contrary, relying on a blocklist input validation approach or solely relying on cryptographic hashing functions might not fully prevent injection attacks, as blocklists cannot anticipate all possible malicious inputs and hashing functions do not actually validate input but rather ensure data integrity post-submission. While data type enforcement is a good practice, on its own, it may not be sufficient to prevent the diversity of injection attacks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is allowlist input validation?
What are injection attacks, and why are they dangerous?
What is the difference between allowlist and blocklist validation?
When managing vulnerabilities within an organization's infrastructure, which criteria should be considered MOST important for prioritization?
Ease of implementation for the fix
Security team's personal preference
Popularity of the software with vulnerabilities
Potential impact on business operations
Answer Description
The correct answer is 'Potential impact on business operations' because when prioritizing vulnerabilities, the primary concern is how a vulnerability might affect critical business functions and operations. If the impact is high, it could lead to significant loss or damage, so these vulnerabilities need to be addressed first. Other options such as the ease of implementation, popularity of the software, and personal preference are considered, but they do not outweigh the importance of the potential impact on business operations.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is the potential impact on business operations the most important criterion for prioritizing vulnerabilities?
Can you provide examples of vulnerabilities that have had significant impacts on business operations?
What other factors might influence the prioritization of vulnerabilities besides potential impact?
Which of the following actions provides logical (software-defined) segmentation rather than physical segmentation within an enterprise network?
Running a point-to-point dark-fiber link between two database servers to separate their traffic from the LAN.
Deploying dedicated cabling and standalone switches to isolate the payroll network.
Configuring separate VLANs and matching IP subnets on existing switch ports to keep voice and data traffic isolated.
Installing an air-gapped workstation that has no network interface card.
Answer Description
Configuring separate VLANs and matching IP subnets on the existing switch infrastructure isolates traffic at Layers 2-3 using software-defined settings. This is a logical segmentation method because it relies on switch port configuration and IP addressing, not on additional physical hardware or cabling. Installing air-gapped systems, dedicating separate switches/cabling, or running a stand-alone dark-fiber link all require new physical infrastructure and therefore constitute physical segmentation.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the OSI model?
What is the difference between logical and physical segmentation?
What are VLANs and how do they relate to subnetting?
According to industry guidance such as NIST SP 800-88, which high-level action should an organization take to ensure that data on any storage device (including HDDs and SSDs) is rendered unrecoverable before the device is disposed of or leaves organizational control?
Sanitize the media before disposal
Disable the storage controller in the system BIOS
Run a quick format on the device
Delete all visible files and empty the recycle bin
Answer Description
Media sanitization is defined by NIST SP 800-88 as a process that makes access to the data infeasible. Sanitization can be accomplished by methods such as overwriting, cryptographic erase, degaussing (for magnetic media), or physical destruction, depending on the device. Simply formatting, deleting files, or disabling hardware does not guarantee that residual data cannot be recovered.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the different methods of data sanitization?
Why is data sanitization necessary before disposing of a hard drive?
What is the difference between data sanitization and data deletion?
Gnarly!
Looks like that's it! You can go back and review your answers or click the button below to grade your test.